nccgroup / nmap-nse-vulnerability-scripts

NMAP Vulnerability Scanning Scripts
625 stars 61 forks source link

Include cookbook-style instructions? #7

Open PenelopeFudd opened 2 years ago

PenelopeFudd commented 2 years ago

Hi;

You may want to add some instructions on how to run nmap with these scripts. Is it like this?

nmap -sC  --script=smtp-vuln-cve2020-28017-through-28026-21nails.nse $your_hostname_here

Also, if you get some more scripts, add a simple shell script that will run all of the scripts (and no other scripts).

And, much as I hate to point it out, the current number of scripts (one?) is looking a little meagre. If you could maybe add one a day, it would really make the site look alive! :-)

Cheers!

olliencc commented 2 years ago

thank you will do.

TriJoe commented 2 years ago

On Windows, this command just does a basic port scan, no indication if it is working or not. Is this correct?

C:\Users\Me>nmap -sC --script=smtp-vuln-cve2020-28017-through-28026-21nails.nse x.x.x.x Starting Nmap 7.92 ( https://nmap.org ) at 2022-04-21 15:24 GMT Summer Time Nmap scan report for server (x.x.x.x) Host is up (0.048s latency). rDNS record for x.x.x.x: dns.host.net Not shown: 932 filtered tcp ports (no-response), 56 closed tcp ports (reset) PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 25/tcp open smtp 53/tcp open domain 80/tcp open http 110/tcp open pop3 143/tcp open imap 443/tcp open https 465/tcp open smtps 993/tcp open imaps 995/tcp open pop3s 8443/tcp open https-alt

Nmap done: 1 IP address (1 host up) scanned in 4.76 seconds