Closed tralston closed 2 years ago
Update: I ran nmap -v --script smb-vuln-ms17-010 -p445 <target>
and apparently my machine is patched. I wanted to make sure though, so I tried looking at the methods discussed on this KB page, and none of the methods to turn off SMBv1 look like they've been enacted.
Is there some Windows Update or other way I can verify outside your script that my system has been patched?
I followed your instructions in the notes page, and whenever I run
nmap --script smb-vuln-ms17-010 -p445 <target>
I just get a normal output as if there were no script option included:
No mention of the script. I've run this locally on my Windows PC (W7 SP1) and from an Ubuntu machine. Both run Nmap 7.50, I tried copying the script (from nmap.org, which seems to be newer than the one here...) into the scripts folder and running
script-updatedb
. It's always the same output. What am I doing wrong?