NSE LIB

Browse Nmap NSE scripts in a faster,
cleaner reference library.

Explore official Nmap scripts and community-maintained entries through a focused, searchable interface built for quick lookup, comparison, and discovery.

Official + community scripts Searchable reference Static by design

Search Scripts

/ Ctrl/Cmd + K

Filter scripts by name, category, tag, or source to get to the right entry quickly.

Total

826

Official

612

Unofficial

214

Library

NSE Scripts

A single catalog of official and unofficial NSE scripts, with source labels on every card for quick scanning.

826 scripts

Intrusive

1085-ms-sql-sp-execute-external-script

Unofficial

Attempts to run system commands using Microsoft SQL Server Machine Learning Services with sp_execute_external_script.

#intrusive #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Default

1124-osgi-info

Unofficial

Gathers information (a list of server properties) from an Eclipse Equinoxe OSGi (Open Service Gateway initiative) console.

#default #discovery #safe #version #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1125-http-cisco-webvpn-cookie

Unofficial

Looks for webvpn cookies that could denote a Cisco ASA SSL VPN WebVPN Service is enabled on a port. This may also apply to a Cisco IOS based router running the Client SSLVPN Service which is rare but possible.

#discovery #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1202-http-vuln-cve2018-8735

Unofficial

NagiosXI versions before 5.4.13 are vulnerable to an unauthenticated remote root exploit. This unobtrusive script simply sends a single HTTP GET request for /nagiosxi/login.php and matches strings to identify the product and version.

#vuln #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Intrusive

1260-http-weblogic-brute

Unofficial

Weblogic Console Brute Script

#intrusive #brute #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1377-http-vuln-cve2018-10823

Unofficial

Shell command injection vulnerability on D-Link routers:

#vuln #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1383-http-vuln-cve2018-9206

Unofficial

Unauthenticated arbitrary file upload vulnerability on jQuery-File-Upload <= v9.22.0.

#vuln #intrusive #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1395-http-vuln-cve2018-7600

Unofficial

A Remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised.

#vuln #intrusive #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1402-http-calibre

Unofficial

Checks for presence of Calibre e-book web server. It will check if Calibre requires authentication and will attempt to enumerate how many books are available.

#discovery #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1445-pcom-discover

Unofficial

Collects device information for Unitronics PLCs via PCOM protocol.

#discovery #version #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1452-http-vuln-cve2015-6396

Unofficial

Executes remote code by exploiting the CVE-2015-6396 vulnerability in the following Cisco devices:

#vuln #intrusive #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1459-http-vuln-cve2019-1652

Unofficial

A remote code execution vulnerability exists in the web-based management interface of Cisco RV320 and RV325 routers, which allows an authenticated user to execute arbitrary commands on the underlying Linux shell as root by sending malicious HTTP POST requests to the web-based management interface.

#vuln #intrusive #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1462-http-vuln-cve2018-11776

Unofficial

Detects whether the specified URL is vulnerable to the Apache Strut2 Namespace Redirect OGNL Injection Remote Code Execution Vulnerability (CVE-2018-11776).

#vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1463-http-vuln-cve2017-9805

Unofficial

Detects whether the specified URL is vulnerable to the Apache Struts REST Plugin XStream Remote Code Execution Vulnerability (CVE-2017-9805).

#vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1510-broadcast-mndp-discover

Unofficial

Discovers MikroTik devices on a LAN by sending a MikroTik Neighbor Discovery Protocol (MNDP) network broadcast probe.

#discovery #broadcast #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1539-cip-tags-enum

Unofficial

Collects all tag names and types for Allen-Bradley Logix 5000 PLCs via CIP Service Code 0x55 - Get_Instance_Attribute_List

#discovery #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Safe

1564-kubernetes-version

Unofficial

Attempts to detect the Kubernetes API version.

#safe #version #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Default

1697-dns-any-query

Unofficial

Checks if ANY dns type is allowed.

#default #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1708-http-vuln-cve2019-11510

Unofficial

A file inclusion vulnerability affecting Pulse Secure Pulse Connect Secure (PCS) SSLVPN appliance versions before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 allows an unauthenticated remote attacker to send a specially crafted URI to perform an arbitrary file read.

#vuln #auth #exploit #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1709-http-vuln-cve2018-13379

Unofficial

Performs a scan to check whether the scanned server is vulnerable to CVE-2018-13379

#discovery #intrusive #vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1715-http-vuln-cve2019-11510

Unofficial

Pulse Secure SSL VPN file disclosure via specially crafted HTTP resource requests. This exploit reads /etc/passwd as a proof of concept This vulnerability affect ( 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4

#vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Exploit

1763-cisco-siet

Unofficial

Script attempts to see whether Cisco device allows us to download config using smart install protocol (4786/tcp). If script confirms that test is successfull and that user has passed get option, script will start tftp server and issue commands to device to copy currently running config to us.

#exploit #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1846-broadcast-pndcp-discovery

Unofficial

Sends a DCP identify request to the Profinet DCP identification MAC address 01:0e:cf:00:00:00 and reports the resulsts. The script displays information about the responding Profinet devices which can contain the station name, vendor information and IP address configuration.

#discovery #safe #broadcast #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

1893-http-vuln-cve2019-19781

Unofficial

This NSE script checks whether the target server is vulnerable to CVE-2019-19781

#discovery #exploit #vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

1994-http-draytek-rce

Unofficial

Detects Drayteks devices vulnerable to CVE-2020-8515 This script uses a safe check to confirm the vulnerability Then dumps the device's /etc/passwd file References: * https://www.draytek.com/about/security-advisory/vigor3900-/-vigor2960-/-vigor300b-router-web-management-page-vulnerability-(cve-2020-8515)/, * https://blog.netlab.360.com/two-zero-days-are-targeting-draytek-broadband-cpe-devices/, * https://github.com/imjdl/CVE-2020-8515-PoC

#vuln #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

2040-http-creds-finder

Unofficial

This script will spider a website and look for any sensitive API Keys or secrets

#discovery #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Default

2040-http-ruby-environment

Unofficial

Sample script to detect the presence of a Ruby on Rails rack-mini-profiler gem that is used to provide performance metrics for Rails applications. This simple detection script finds the environment variables page and looks for exposed API keys and other sensitive data such as credentials at '?pp=env' appended to default host URL. It is possible that Rails developers can expose environment variables through the gem without fully understanding their implications.

#default #safe #vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Exploit

2147-http-sap-igs-xmlchart-xxe

Unofficial

Script for exploiting CVE-2018-2392 and CVE-2018-2393, two XXE vulnerabilities in outdated versions of SAP IGS servers. You can now exploit these vulnerabilities by using this script to read arbitrary files on vulnerable systems as the user who installed the SAP IGS server.

#exploit #vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

2169-weblogic-cve-2020-14882

Unofficial

Detects the unauthenticated RCE in the Console component of Oracle WebLogic Server (CVE-2020-14882).

#vuln #intrusive #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

2248-zookeeper-info

Unofficial

Queries Apache Zookeeper on port 2181 to get information about the instance.

#discovery #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

2249-tcp-uptime

Unofficial

Retrieve system boot-time via TCP-options. This information would be used for detecting NAT, balancing or other information.

#discovery #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

2308-http-vuln-cve2019-14322

Unofficial

CVE-2019-14322 - A vulnerability was found in Pallets Werkzeug up to 0.15.4. It has been declared as critical. This vulnerability affects the function SharedDataMiddleware of the component Windows. The manipulation with an unknown input leads to a directory traversal vulnerability. The CWE definition for the vulnerability is CWE-22. This script reads c:/windows/win.ini as a proof of concept. This vulnerability is running on (cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*)

#vuln #exploit #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Safe

2334-x3-adxsrv

Unofficial

Checks if an X3 AdxSrv service is present and vulnerable to a directory disclosure vulnerability.

#safe #vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Dos

2447-dos_iis_2022_21907

Unofficial

The IIS Web Server contains a RCE vulnerability. This script exploits this vulnerability with a DOS attack (causes a Blue Screen).

#dos #exploit #intrusive #vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Safe

2450-RCE_CVE2021_42013

Unofficial

The Apache Web Server contains a RCE vulnerability. This script detects and exploits this vulnerability with RCE attack (execute commands) and local file disclosure.

#safe #exploit #intrusive #vuln #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Community

2451-RCE_CVE2021_41773

Unofficial

2451-RCE_CVE2021_41773

#chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

2546-cve-2022-40684

Unofficial

Check Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [Exploit ] POC for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager appliances.

#vuln #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

297-bittorrent-report

Unofficial

This script is an adaptation of <bittorent-discovery.nse> and can be used to retrieve the number of [seeders] and [leeches] for a variable number of .torrent files. User must specify the root directory then the script will recursively load and test each .torrent file found. DHT discovery will not be performed and no target machine will be investigated for open ports. IPs read from communicated data can be printed on standard output using the -d debug feature (or -v). The idea is to have a statistic of data available/requested. A report is printed on standard output, a list of files and their values. Note: HTTP values are guessed and may be incorrect.

#discovery #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Community

548-tftp-fingerprints

Unofficial

548-tftp-fingerprints

#chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Default

548-tftp-version

Unofficial

Obtains information (such as vendor and device type where available) from a TFTP service. Software vendor information is deduced based on error messages.

#default #safe #version #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

718-oracle-vuln-tns-poison

Unofficial

Detects the TNS Poison vulnerability.

#vuln #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

778-http-vuln-cve2015-1579

Unofficial

Directory traversal vulnerability in the Elegant Themes Divi theme for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the img parameter in a revslider_show_image action to wp-admin/admin-ajax.php.

#vuln #intrusive #exploit #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

779-http-asuswrt-session-hijacking

Unofficial

ASUSWRT is a wireless router operating system that powers many routers produced by ASUS.

#vuln #intrusive #exploit #dos #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

779-http-asuswrt-xss

Unofficial

ASUSWRT is a wireless router operating system that powers many routers produced by ASUS.

#vuln #intrusive #exploit #dos #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Vuln

783-http-vuln-cve2017-6527

Unofficial

dnaLIMS is prone to the Directory Traversal attack.

#vuln #intrusive #exploit #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Exploit

828-iis-buffer-overflow

Unofficial

Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.

#exploit #vuln #intrusive #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Default

951-winrm-auth-methods

Unofficial

Returns authentication methods a winrm server supports.

#default #discovery #safe #chinarulezzz/nmap-extra-nse
Ports: Any Protocols: n/a
View Script Details

Safe

abb-cve-2019-7226

Unofficial

Module Author: r00t-3xp10it {Disclosure = Eldar Marcussen} NSE script to detect if target [ip]:[port][/url] its affected by CVE-2019-7226 (Improper Authentication) The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Specifically, /cgi/loginDefaultUser creates a session in an authenticated state and returns the session ID along with what may be the username and cleartext password of the user. An attacker can then supply an IDALToken value in a cookie, which will allow them to perform privileged operations such as restarting the service with /cgi/restart.

#safe #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Safe

abb-cve-2019-7226

Unofficial

Module Author: r00t-3xp10it {Disclosure = Eldar Marcussen} NSE script to detect if target [ip]:[port][/url] its affected by CVE-2019-7226 (Improper Authentication) The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Specifically, /cgi/loginDefaultUser creates a session in an authenticated state and returns the session ID along with what may be the username and cleartext password of the user. An attacker can then supply an IDALToken value in a cookie, which will allow them to perform privileged operations such as restarting the service with /cgi/restart.

#safe #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Safe

acarsd-info

Official

Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved by this script includes the daemon version, API version, administrator e-mail address and listening frequency.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

address-info

Official

Shows extra information about IPv6 addresses, such as embedded MAC or IPv4 addresses when available.

#default #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

afp-brute

Official

Performs password guessing against Apple Filing Protocol (AFP).

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

afp-ls

Official

Attempts to get useful information about files from AFP volumes. The output is intended to resemble the output of ls .

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

afp-path-vuln

Official

Detects the Mac OS X AFP directory traversal vulnerability, CVE-2010-0533.

#exploit #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

afp-serverinfo

Official

Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type (for example Macmini or MacBookPro ).

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

afp-showmount

Official

Shows AFP shares and ACLs.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ajp-auth

Official

Retrieves the authentication scheme and realm of an AJP service (Apache JServ Protocol) that requires authentication.

#default #auth #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

ajp-brute

Official

Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by web servers to communicate with back-end Java application server containers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ajp-headers

Official

Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol server and returns the server response headers.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ajp-methods

Official

Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists potentially risky methods.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ajp-request

Official

Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file). Different AJP methods such as; GET, HEAD, TRACE, PUT or DELETE may be used.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

allseeingeye-info

Official

Detects the All-Seeing Eye service. Provided by some game servers for querying the server's status.

#discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Default

amqp-info

Official

Gathers information (a list of all server properties) from an AMQP (advanced message queuing protocol) server.

#default #discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

asn-query

Official

Maps IP addresses to autonomous system (AS) numbers.

#discovery #external #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Default

auth-owners

Official

Attempts to find the owner of an open TCP port by querying an auth daemon which must also be open on the target system. The auth service, also known as identd, normally runs on port 113.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Malware

auth-spoof

Official

Checks for an identd (auth) server which is spoofing its replies.

#malware #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

AXISwebcam-recon

Unofficial

Module Author: r00t-3xp10it & Cleiton Pinheiro NSE script to detect if target [ip]:[port][/url] its an AXIS Network Camera transmiting (live). This script also allow is users to send a fake User-Agent in the tcp packet <agent=User-Agent-String> and also allow is users to input a diferent uri= [/url] link to be scan, IF none uri= value its inputed, then this script tests a List of AXIS default [/url's] available in our database to brute force the HTML TITLE tag. 'Remark: This nse script will NOT execute againts webcams found that require authentication logins'

#safe #discovery #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Safe

AXISwebcam-recon

Unofficial

Module Author: r00t-3xp10it & Cleiton Pinheiro NSE script to detect if target [ip]:[port][/url] its an AXIS Network Camera transmiting (live). This script also allow is users to send a fake User-Agent in the tcp packet <agent=User-Agent-String> and also allow is users to input a diferent uri= [/url] link to be scan, IF none uri= value its inputed, then this script tests a List of AXIS default [/url's] available in our database to brute force the HTML TITLE tag. 'Remark: This nse script will NOT execute againts webcams found that require authentication logins'

#safe #discovery #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Intrusive

backorifice-brute

Official

Performs brute force password auditing against the BackOrifice service. The backorifice-brute.ports script argument is mandatory (it specifies ports to run the script against).

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

backorifice-info

Official

Connects to a BackOrifice service and gathers information about the host and the BackOrifice service itself.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

bacnet-info

Official

Discovers and enumerates BACNet Devices collects device information based off standard requests. In some cases, devices may not strictly follow the specifications, or may comply with older versions of the specifications, and will result in a BACNET error response. Presence of this error positively identifies the device as a BACNet device, but no enumeration is possible.

#discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

banner

Official

A simple banner grabber which connects to an open TCP port and prints out anything sent by the listening service within five seconds.

#discovery #safe
Ports: Any Protocols: n/a
View Script Details

Discovery

bitcoin-getaddr

Official

Queries a Bitcoin server for a list of known Bitcoin nodes

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

bitcoin-info

Official

Extracts version and node information from a Bitcoin server

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

bitcoinrpc-info

Official

Obtains information from a Bitcoin server by calling getinfo on its JSON-RPC interface.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

bittorrent-discovery

Official

Discovers bittorrent peers sharing a file based on a user-supplied torrent file or magnet link. Peers implement the Bittorrent protocol and share the torrent, whereas the nodes (only shown if the include-nodes NSE argument is given) implement the DHT protocol and are used to track the peers. The sets of peers and nodes are not the same, but they usually intersect.

#discovery #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Safe

bjnp-discover

Official

Retrieves printer or scanner information from a remote device supporting the BJNP protocol. The protocol is known to be supported by network based Canon devices.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-ataoe-discover

Official

Discovers servers supporting the ATA over Ethernet protocol. ATA over Ethernet is an ethernet protocol developed by the Brantley Coile Company and allows for simple, high-performance access to SATA drives over Ethernet.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-avahi-dos

Official

Attempts to discover hosts in the local network using the DNS Service Discovery protocol and sends a NULL UDP packet to each host to test if it is vulnerable to the Avahi NULL UDP packet denial of service (CVE-2011-1002).

#broadcast #dos #intrusive #vuln #prerule
Ports: Any Protocols: n/a
View Script Details

Safe

broadcast-bjnp-discover

Official

Attempts to discover Canon devices (Printers/Scanners) supporting the BJNP protocol by sending BJNP Discover requests to the network broadcast address for both ports associated with the protocol.

#safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-db2-discover

Official

Attempts to discover DB2 servers on the network by sending a broadcast request to port 523/udp.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-dhcp-discover

Official

Sends a DHCP request to the broadcast address (255.255.255.255) and reports the results. By default, the script uses a static MAC address (DE:AD:CO:DE:CA:FE) in order to prevent IP pool exhaustion.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-dhcp6-discover

Official

Sends a DHCPv6 request (Solicit) to the DHCPv6 multicast address, parses the response, then extracts and prints the address along with any options returned by the server.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-dns-service-discovery

Official

Attempts to discover hosts' services using the DNS Service Discovery protocol. It sends a multicast DNS-SD query and collects all the responses.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-dropbox-listener

Official

Listens for the LAN sync information broadcasts that the Dropbox.com client broadcasts every 20 seconds, then prints all the discovered client IP addresses, port numbers, version numbers, display names, and more.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

broadcast-eigrp-discovery

Official

Performs network discovery and routing information gathering through Cisco's Enhanced Interior Gateway Routing Protocol (EIGRP).

#discovery #broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

broadcast-hid-discoveryd

Official

Discovers HID devices on a LAN by sending a discoveryd network broadcast probe.

#discovery #broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

broadcast-igmp-discovery

Official

Discovers targets that have IGMP Multicast memberships and grabs interesting information.

#discovery #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

broadcast-jenkins-discover

Official

Discovers Jenkins servers on a LAN by sending a discovery broadcast probe.

#discovery #broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-listener

Official

Sniffs the network for incoming broadcast communication and attempts to decode the received packets. It supports protocols like CDP, HSRP, Spotify, DropBox, DHCP, ARP and a few more. See packetdecoders.lua for more information.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-ms-sql-discover

Official

Discovers Microsoft SQL servers in the same broadcast domain.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-netbios-master-browser

Official

Attempts to discover master browsers and the domains they manage.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-networker-discover

Official

Discovers EMC Networker backup software servers on a LAN by sending a network broadcast query.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-novell-locate

Official

Attempts to use the Service Location Protocol to discover Novell NetWare Core Protocol (NCP) servers.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-ospf2-discover

Official

Discover IPv4 networks using Open Shortest Path First version 2(OSPFv2) protocol.

#broadcast #discovery #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-pc-anywhere

Official

Sends a special broadcast probe to discover PC-Anywhere hosts running on a LAN.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-pc-duo

Official

Discovers PC-DUO remote control hosts and gateways running on a LAN by sending a special broadcast UDP probe.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

broadcast-pim-discovery

Official

Discovers routers that are running PIM (Protocol Independent Multicast).

#discovery #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

broadcast-ping

Official

Sends broadcast pings on a selected interface using raw ethernet packets and outputs the responding hosts' IP and MAC addresses or (if requested) adds them as targets. Root privileges on UNIX are required to run this script since it uses raw sockets. Most operating systems don't respond to broadcast-ping probes, but they can be configured to do so.

#discovery #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-pppoe-discover

Official

Discovers PPPoE (Point-to-Point Protocol over Ethernet) servers using the PPPoE Discovery protocol (PPPoED). PPPoE is an ethernet based protocol so the script has to know what ethernet interface to use for discovery. If no interface is specified, requests are sent out on all available interfaces.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-rip-discover

Official

Discovers hosts and routing information from devices running RIPv2 on the LAN. It does so by sending a RIPv2 Request command and collects the responses from all devices responding to the request.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-ripng-discover

Official

Discovers hosts and routing information from devices running RIPng on the LAN by sending a broadcast RIPng Request command and collecting any responses.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-sonicwall-discover

Official

Discovers Sonicwall firewalls which are directly attached (not routed) using the same method as the manufacturers own 'SetupTool'. An interface needs to be configured, as the script broadcasts a UDP packet.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-sybase-asa-discover

Official

Discovers Sybase Anywhere servers on the LAN by sending broadcast discovery messages.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-tellstick-discover

Official

Discovers Telldus Technologies TellStickNet devices on the LAN. The Telldus TellStick is used to wirelessly control electric devices such as lights, dimmers and electric outlets. For more information: http://www.telldus.com/

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-upnp-info

Official

Attempts to extract system information from the UPnP service by sending a multicast query, then collecting, parsing, and displaying all responses.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-versant-locate

Official

Discovers Versant object databases using the broadcast srvloc protocol.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-wake-on-lan

Official

Wakes a remote system up from sleep by sending a Wake-On-Lan packet.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-wpad-discover

Official

Retrieves a list of proxy servers on a LAN using the Web Proxy Autodiscovery Protocol (WPAD). It implements both the DHCP and DNS methods of doing so and starts by querying DHCP to get the address. DHCP discovery requires nmap to be running in privileged mode and will be skipped when this is not the case. DNS discovery relies on the script being able to resolve the local domain either through a script argument or by attempting to reverse resolve the local IP.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-wsdd-discover

Official

Uses a multicast query to discover devices supporting the Web Services Dynamic Discovery (WS-Discovery) protocol. It also attempts to locate any published Windows Communication Framework (WCF) web services (.NET 4.0 or later).

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

broadcast-xdmcp-discover

Official

Discovers servers running the X Display Manager Control Protocol (XDMCP) by sending a XDMCP broadcast request to the LAN. Display managers allowing access are marked using the keyword Willing in the result.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Intrusive

cassandra-brute

Official

Performs brute force password auditing against the Cassandra database.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

cassandra-brute

Unofficial

Performs brute force password auditing against the Cassandra database.

#intrusive #brute #kost/nmap-nse
Ports: Any Protocols: n/a
View Script Details

Default

cassandra-info

Official

Attempts to get basic info and server status from a Cassandra database.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

cassandra-info

Unofficial

Attempts to get basic info and server status from a Cassandra database.

#default #discovery #safe #kost/nmap-nse
Ports: Any Protocols: n/a
View Script Details

Version

cccam-version

Official

Detects the CCcam service (software for sharing subscription TV among multiple receivers).

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

cics-enum

Official

CICS transaction ID enumerator for IBM mainframes. This script is based on mainframe_brute by Dominic White ( https://github.com/sensepost/mainframe_brute ). However, this script doesn't rely on any third party libraries or tools and instead uses the NSE TN3270 library which emulates a TN3270 screen in lua.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

cics-info

Official

Using the CICS transaction CEMT, this script attempts to gather information about the current CICS transaction server region. It gathers OS information, Datasets (files), transactions and user ids. Based on CICSpwn script by Ayoub ELAASSAL.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

cics-user-brute

Official

CICS User ID brute forcing script for the CESL login screen.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

cics-user-enum

Official

CICS User ID enumeration script for the CESL/CESN Login screen.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

cisco-cve-2019-1937

Unofficial

Module Author: r00t-3xp10it {Disclosure = Pedro Ribeiro} A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.

#safe #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Safe

cisco-cve-2019-1937

Unofficial

Module Author: r00t-3xp10it {Disclosure = Pedro Ribeiro} A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an unauthenticated, remote attacker to acquire a valid session token with administrator privileges, bypassing user authentication. The vulnerability is due to insufficient request header validation during the authentication process. An attacker could exploit this vulnerability by sending a series of malicious requests to an affected device. An exploit could allow the attacker to use the acquired session token to gain full administrator access to the affected device.

#safe #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Intrusive

citrix-brute-xml

Official

Attempts to guess valid credentials for the Citrix PN Web Agent XML Service. The XML service authenticates against the local Windows server or the Active Directory.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

citrix-enum-apps

Official

Extracts a list of published applications from the ICA Browser service.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

citrix-enum-apps-xml

Official

Extracts a list of applications, ACLs, and settings from the Citrix XML service.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

citrix-enum-servers

Official

Extracts a list of Citrix servers from the ICA Browser service.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

citrix-enum-servers-xml

Official

Extracts the name of the server farm and member servers from Citrix XML service.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

clamav-exec

Official

Exploits ClamAV servers vulnerable to unauthenticated clamav comand execution.

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

clock-skew

Official

Analyzes the clock skew between the scanner and various services that report timestamps.

#default #safe
Ports: Any Protocols: n/a
View Script Details

Safe

coap-resources

Official

Dumps list of available resources from CoAP endpoints.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

couchdb-databases

Official

Gets database tables from a CouchDB database.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

couchdb-stats

Official

Gets database statistics from a CouchDB database.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

country_scan

Unofficial

Scan by country.

#discovery #mmpx12/nse-country-scan
Ports: Any Protocols: n/a
View Script Details

Auth

creds-summary

Official

Lists all discovered credentials (e.g. from brute force and default password checking scripts) at end of scan.

#auth #default #safe #postrule
Ports: Any Protocols: n/a
View Script Details

Safe

cups-info

Official

Lists printers managed by the CUPS printing service.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

cups-queue-info

Official

Lists currently queued print jobs of the remote CUPS service grouped by printer.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

cve-2020-0796

Unofficial

smb-protocols script modified to apply check for CVE-2020-0796 by psc4re. Attempts to list the supported protocols and dialects of a SMB server. Packet check based on https://github.com/ollypwn/SMBGhost/ The script attempts to initiate a connection using the dialects: * NT LM 0.12 (SMBv1) * 2.02 (SMBv2) * 2.10 (SMBv2) * 3.00 (SMBv3) * 3.02 (SMBv3) * 3.11 (SMBv3)

#safe #discovery #psc4re/nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

cve-2020-1350

Unofficial

Retrieves information from a DNS nameserver and also checks against CVE-2020-1350 for Microsoft SigRED issue This script performs the same queries as the following dig commands: - dig CH TXT bind.version @target

#discovery #default #safe #psc4re/nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

CVE-2021-21972

Unofficial

VMware vCenter Server CVE-2021-21972 Remote Code Execution Vulnerability

#vuln #exploit #alt3kx/cve-2021-21972
Ports: Any Protocols: n/a
View Script Details

Default

CVE-2021-21972

Unofficial

Script by @psc4re for checking against CVE-2021-21972, CVE-2021-21973 Vulnerability in vCenter. The script also additionally prints the vSphere Version and Build Number

#default #discovery #safe #psc4re/nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

cvs-brute

Official

Performs brute force password auditing against CVS pserver authentication.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

cvs-brute-repository

Official

Attempts to guess the name of the CVS repositories hosted on the remote server. With knowledge of the correct repository name, usernames and passwords can be guessed.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

daap-get-library

Official

Retrieves a list of music from a DAAP server. The list includes artist names and album and song titles.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

daytime

Official

Retrieves the day and time from the Daytime service.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

db2-das-info

Official

Connects to the IBM DB2 Administration Server (DAS) on TCP or UDP port 523 and exports the server profile. No authentication is required for this request.

#safe #discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

deluge-rpc-brute

Official

Performs brute force password auditing against the DelugeRPC daemon.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dhcp-discover

Official

Sends a DHCPINFORM request to a host on UDP port 67 to obtain all the local configuration parameters without allocating a new address.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

dicom-brute

Official

Attempts to brute force the Application Entity Title of a DICOM server (DICOM Service Provider).

#auth #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

dicom-brute

Unofficial

Attempts to brute force the Application Entity Title of a DICOM server (DICOM Service Provider).

#auth #brute #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

dicom-ping

Official

Attempts to discover DICOM servers (DICOM Service Provider) through a partial C-ECHO request. It also detects if the server allows any called Application Entity Title or not.

#discovery #default #safe #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dicom-ping

Unofficial

Attempts to discover DICOM servers (DICOM Service Provider) through a partial C-ECHO request. It also detects if the server allows any called Application Entity Title or not.

#discovery #default #safe #auth #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

dict-info

Official

Connects to a dictionary server using the DICT protocol, runs the SHOW SERVER command, and displays the result. The DICT protocol is defined in RFC 2229 and is a protocol which allows a client to query a dictionary server for definitions from a set of natural language dictionary databases.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

distcc-cve2004-2687

Official

Detects and exploits a remote code execution vulnerability in the distributed compiler daemon distcc. The vulnerability was disclosed in 2002, but is still present in modern implementation due to poor configuration of the service.

#exploit #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Save

dlink-cve-2019-13101

Unofficial

Module Author: r00t-3xp10it {Disclosure = Devendra Singh} Detects whether the D-Link DIR-600 or DIR-615 router is vulnerable to Incorrect Access Control Vulnerability (CVE-2019-13101). A remote vulnerability was discovered on D-Link DIR-600M/DIR-615 Wireless Home Router in multiple respective firmware versions (3.02 up to 3.06). The vulnerability provides unauthenticated remote access to the routers WAN configuration page i.e. '/wan.htm' which leads to disclosure of sensitive user info about the WAN, including but not limited to PPPoE, DNS configuration etc, also allowing us to change the router configuration settings.

#save #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Save

dlink-cve-2019-13101

Unofficial

Module Author: r00t-3xp10it {Disclosure = Devendra Singh} Detects whether the D-Link DIR-600 or DIR-615 router is vulnerable to Incorrect Access Control Vulnerability (CVE-2019-13101). A remote vulnerability was discovered on D-Link DIR-600M/DIR-615 Wireless Home Router in multiple respective firmware versions (3.02 up to 3.06). The vulnerability provides unauthenticated remote access to the routers WAN configuration page i.e. '/wan.htm' which leads to disclosure of sensitive user info about the WAN, including but not limited to PPPoE, DNS configuration etc, also allowing us to change the router configuration settings.

#save #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

External

dns-blacklist

Official

Checks target IP addresses against multiple DNS anti-spam and open proxy blacklists and returns a list of services for which an IP has been flagged. Checks may be limited by service category (eg: SPAM, PROXY) or to a specific service name.

#external #safe #prerule #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

dns-brute

Official

Attempts to enumerate DNS hostnames by brute force guessing of common subdomains. With the dns-brute.srv argument, dns-brute will also try to enumerate common DNS SRV records.

#intrusive #discovery #prerule #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

dns-brute2

Unofficial

Attempts to enumerate DNS hostnames by brute force guessing of common subdomains. With the <code>dns-brute.srv</code> argument, dns-brute will also try to enumerate common DNS SRV records.

#intrusive #discovery #aerissecure/nse
Ports: Any Protocols: n/a
View Script Details

Intrusive

dns-cache-snoop

Official

Performs DNS cache snooping against a DNS server.

#intrusive #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-check-zone

Official

Checks DNS zone configuration against best practices, including RFC 1912. The configuration checks are divided into categories which each have a number of different tests.

#discovery #safe #external #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-client-subnet-scan

Official

Performs a domain lookup using the edns-client-subnet option which allows clients to specify the subnet that queries supposedly originate from. The script uses this option to supply a number of geographically distributed locations in an attempt to enumerate as many different address records as possible. The script also supports requests using a given subnet.

#discovery #safe #prerule #portrule
Ports: Any Protocols: n/a
View Script Details

Fuzzer

dns-fuzz

Official

Launches a DNS fuzzing attack against DNS servers.

#fuzzer #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

dns-ip6-arpa-scan

Official

Performs a quick reverse DNS lookup of an IPv6 network using a technique which analyzes DNS server response codes to dramatically reduce the number of queries needed to enumerate large networks.

#intrusive #discovery #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-nsec-enum

Official

Enumerates DNS names using the DNSSEC NSEC-walking technique.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-nsec3-enum

Official

Tries to enumerate domain names from the DNS server that supports DNSSEC NSEC3 records.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-nsec3-enum

Unofficial

Tries to enumerate domain names from the DNS server that supports DNSSEC NSEC3 records.

#discovery #intrusive #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-nsid

Official

Retrieves information from a DNS nameserver by requesting its nameserver ID (nsid) and asking for its id.server and version.bind values. This script performs the same queries as the following two dig commands: - dig CH TXT bind.version @target - dig +nsid CH TXT id.server @target

#discovery #default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-openresolvers-check

Unofficial

dns-openresolvers-check looks up the database "dnsbl.openresolvers.org" to detect DNS servers known to allow open recursion. If the DNS server is found, it will be marked as vulnerable as it can be abused via DNS amplification attacks.

#discovery #safe #external #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

External

dns-random-srcport

Official

Checks a DNS server for the predictable-port recursion vulnerability. Predictable source ports can make a DNS server vulnerable to cache poisoning attacks (see CVE-2008-1447).

#external #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

External

dns-random-txid

Official

Checks a DNS server for the predictable-TXID DNS recursion vulnerability. Predictable TXID values can make a DNS server vulnerable to cache poisoning attacks (see CVE-2008-1447).

#external #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

dns-recursion

Official

Checks if a DNS server allows queries for third-party names. It is expected that recursion will be enabled on your own internal nameservers.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

dns-service-discovery

Official

Attempts to discover target hosts' services using the DNS Service Discovery protocol.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

dns-srv-enum

Official

Enumerates various common service (SRV) records for a given domain name. The service records contain the hostname, port and priority of servers for a given service. The following services are enumerated by the script: - Active Directory Global Catalog - Exchange Autodiscovery - Kerberos KDC Service - Kerberos Passwd Change Service - LDAP Servers - SIP Servers - XMPP S2S - XMPP C2S

#discovery #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Vuln

dns-update

Official

Attempts to perform a dynamic DNS update without authentication.

#vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

dns-zeustracker

Official

Checks if the target IP range is part of a Zeus botnet by querying ZTDNS @ abuse.ch. Please review the following information before you start to scan: https://zeustracker.abuse.ch/ztdns.php

#safe #discovery #external #malware #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

dns-zone-transfer

Official

Requests a zone transfer (AXFR) from a DNS server.

#intrusive #discovery #prerule #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

docker_daemontcp

Unofficial

Utilizing Docker via unprotected tcp socket (2375/tcp, maybe 2376/tcp), an attacker can create a Docker container with the '/' path mounted with read/write permissions on the host server that is running the Docker container. As the Docker container executes command as uid 0 it is honored by the host operating system allowing the attacker to edit/create files owned by root. This exploit abuses this to creates a cron job in the '/etc/cron.d/' path of the host server. The Docker image should exist on the target system or be a valid image from hub.docker.com.

#discovery #safe #version #vladrico/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Version

docker-version

Official

Detects the Docker service version.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

domcon-brute

Official

Performs brute force password auditing against the Lotus Domino Console.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

domcon-cmd

Official

Runs a console command on the Lotus Domino Console using the given authentication credentials (see also: domcon-brute)

#intrusive #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

domino-enum-users

Official

Attempts to discover valid IBM Lotus Domino users and download their ID files by exploiting the CVE-2006-5835 vulnerability.

#intrusive #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

dpap-brute

Official

Performs brute force password auditing against an iPhoto Library.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

drda-brute

Official

Performs password guessing against databases supporting the IBM DB2 protocol such as Informix, DB2 and Derby

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

drda-info

Official

Attempts to extract information from database servers supporting the DRDA protocol. The script sends a DRDA EXCSAT (exchange server attributes) command packet and parses the response.

#safe #discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

duplicates

Official

Attempts to discover multihomed systems by analysing and comparing information collected by other scripts. The information analyzed currently includes, SSL certificates, SSH host keys, MAC addresses, and Netbios server names.

#safe
Ports: Any Protocols: n/a
View Script Details

Broadcast

eap-info

Official

Enumerates the authentication methods offered by an EAP (Extensible Authentication Protocol) authenticator for a given identity or for the anonymous identity if no argument is passed.

#broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

enip-info

Official

This NSE script is used to send a EtherNet/IP packet to a remote device that has TCP 44818 open. The script will send a Request Identity Packet and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. Information that is parsed includes Device Type, Vendor ID, Product name, Serial Number, Product code, Revision Number, status, state, as well as the Device IP.

#discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Default

epmd-info

Official

Connects to Erlang Port Mapper Daemon (epmd) and retrieves a list of nodes with their respective port numbers.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

eppc-enum-processes

Official

Attempts to enumerate process info over the Apple Remote Event protocol. When accessing an application over the Apple Remote Event protocol the service responds with the uid and pid of the application, if it is running, prior to requesting authentication.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

fcrdns

Official

Performs a Forward-confirmed Reverse DNS lookup and reports anomalous results.

#discovery #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

file-checker

Unofficial

Author: r00t-3xp10it NSE script to check/read contents of the selected file/path in target webserver. This module will search if 'index' exists, and if used --script-args read=true then file-checker.nse script will read/display the contents of the 'index' file.

#discovery #safe #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Discovery

file-checker

Unofficial

Author: r00t-3xp10it NSE script to check/read contents of the selected file/path in target webserver. This module will search if 'index' exists, and if used --script-args read=true then file-checker.nse script will read/display the contents of the 'index' file.

#discovery #safe #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Default

finger

Official

Attempts to retrieve a list of usernames using the finger service.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Version

fingerprint-strings

Official

Prints the readable strings from service fingerprints of unknown services.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

firewalk

Official

Tries to discover firewall rules using an IP TTL expiration technique known as firewalking.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Vuln

firewall-bypass

Official

Detects a vulnerability in netfilter and other firewalls that use helpers to dynamically open ports for protocols such as ftp and sip.

#vuln #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Default

flume-master-info

Official

Retrieves information from Flume master HTTP pages.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

fox-info

Official

Tridium Niagara Fox is a protocol used within Building Automation Systems. Based off Billy Rios and Terry McCorkle's work this Nmap NSE will collect information from A Tridium Niagara system.

#discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Default

freelancer-info

Official

Detects the Freelancer game server (FLServer.exe) service by sending a status query UDP probe.

#default #discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

freevulnsearch

Unofficial

This script [Version 1.1.8] allows you to automatically search for CVEs using the API of https://www.circl.lu/services/cve-search/ in connection with the found CPEs using the parameter -sV in NMAP.

#safe #vuln #external #ocsaf/freevulnsearch
Ports: Any Protocols: n/a
View Script Details

Default

ftp-anon

Official

Checks if an FTP server allows anonymous logins.

#default #auth #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ftp-bounce

Official

Checks to see if an FTP server allows port scanning using the FTP bounce method.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

ftp-brute

Official

Performs brute force password auditing against FTP servers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

ftp-brute

Unofficial

Performs brute force password auditing against FTP servers.

#intrusive #brute #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

ftp-libopie

Official

Checks if an FTPd is prone to CVE-2010-1938 (OPIE off-by-one stack overflow), a vulnerability discovered by Maksymilian Arciemowicz and Adam "pi3" Zabrocki. See the advisory at https://nmap.org/r/fbsd-sa-opie . Be advised that, if launched against a vulnerable host, this script will crash the FTPd.

#vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

ftp-proftpd-backdoor

Official

Tests for the presence of the ProFTPD 1.3.3c backdoor reported as BID 45150. This script attempts to exploit the backdoor using the innocuous id command by default, but that can be changed with the ftp-proftpd-backdoor.cmd script argument.

#exploit #intrusive #malware #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ftp-syst

Official

Sends FTP SYST and STAT commands and returns the result.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

ftp-vsftpd-backdoor

Official

Tests for the presence of the vsFTPd 2.3.4 backdoor reported on 2011-07-04 (CVE-2011-2523). This script attempts to exploit the backdoor using the innocuous id command by default, but that can be changed with the exploit.cmd or ftp-vsftpd-backdoor.cmd script arguments.

#exploit #intrusive #malware #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

ftp-vuln-cve2010-4221

Official

Checks for a stack-based buffer overflow in the ProFTPD server, version between 1.3.2rc3 and 1.3.3b. By sending a large number of TELNET_IAC escape sequence, the proftpd process miscalculates the buffer length, and a remote attacker will be able to corrupt the stack and execute arbitrary code within the context of the proftpd process (CVE-2010-4221). Authentication is not required to exploit this vulnerability.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ganglia-info

Official

Retrieves system information (OS version, available memory, etc.) from a listening Ganglia Monitoring Daemon or Ganglia Meta Daemon.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

giop-info

Official

Queries a CORBA naming server for a list of objects.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

gkrellm-info

Official

Queries a GKRellM service for monitoring information. A single round of collection is made, showing a snapshot of information at the time of the request.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

google-people-enum

Unofficial

Attempts to enumerate valid email addresses using Google's Internal People API. If a valid email address is found, it also grabs the display name and photo from the profile.

#discovery #external #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Default

gopher-ls

Official

Lists files and directories at the root of a gopher service.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

gpsd-info

Official

Retrieves GPS time, coordinates and speed from the GPSD network daemon.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hadoop-datanode-info

Official

Discovers information such as log directories from an Apache Hadoop DataNode HTTP status page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hadoop-jobtracker-info

Official

Retrieves information from an Apache Hadoop JobTracker HTTP status page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hadoop-namenode-info

Official

Retrieves information from an Apache Hadoop NameNode HTTP status page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hadoop-secondary-namenode-info

Official

Retrieves information from an Apache Hadoop secondary NameNode HTTP status page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hadoop-tasktracker-info

Official

Retrieves information from an Apache Hadoop TaskTracker HTTP status page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

hartip-info

Official

This NSE script is used to send a HART-IP packet to a HART device that has TCP 5094 open. The script will establish Session with HART device, then Read Unique Identifier and Read Long Tag packets are sent to parse the required HART device information. Read Sub-Device Identity Summary packet with Sub-Device index 00 01 is sent to request information on Sub-Device, if any available. If the response code differs from 0 (success), the error code is passed as Sub-Device Information. Otherwise, the required Sub-Device information is parsed from response packet.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hbase-master-info

Official

Retrieves information from an Apache HBase (Hadoop database) master HTTP status page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hbase-region-info

Official

Retrieves information from an Apache HBase (Hadoop database) region server HTTP status page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

hddtemp-info

Official

Reads hard disk information (such as brand, model, and sometimes temperature) from a listening hddtemp service.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

hnap-info

Official

Retrieve hardwares details and configuration information utilizing HNAP, the "Home Network Administration Protocol". It is an HTTP-Simple Object Access Protocol (SOAP)-based protocol which allows for remote topology discovery, configuration, and management of devices (routers, cameras, PCs, NAS, etc.)

#safe #discovery #default #version #portrule
Ports: Any Protocols: n/a
View Script Details

External

hostmap

Unofficial

Finds hostnames that resolve to the target's IP address by querying the online databases: * http://www.bfk.de/bfk_dnslogger.html * http://www.whataremyhosts.com ( Bing Search Results )

#external #discovery #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

External

hostmap

Unofficial

Finds hostnames that resolve to the target's IP address by querying the online databases: * http://www.bfk.de/bfk_dnslogger.html * http://www.ip2hosts.com ( Bing Search Results )

#external #discovery #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

External

hostmap-bfk

Official

Discovers hostnames that resolve to the target's IP address by querying the online database at http://www.bfk.de/bfk_dnslogger.html .

#external #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

External

hostmap-crtsh

Official

Finds subdomains of a web server by querying Google's Certificate Transparency logs database ( https://crt.sh ).

#external #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

External

hostmap-crtsh

Unofficial

Finds subdomains of a web server by querying Google's Certificate Transparency logs database (https://crt.sh).

#external #discovery #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

hostmap-hackertarget

Unofficial

Discovers hostnames (DNS A records) that resolve to the target's IP address by querying the online reverse IP lookup at http://hackertarget.com/reverse-ip-lookup/.

#discovery #safe #external #hackertarget/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

External

hostmap-ip2hosts

Unofficial

Finds hostnames that resolve to the target's IP address by querying the online database: * http://www.ip2hosts.com ( Bing Search Results )

#external #discovery #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

hostmap-robtex

Official

Discovers hostnames that resolve to the target's IP address by querying the online Robtex service at http://ip.robtex.com/ .

#discovery #safe #external #prerule #hostrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-adobe-coldfusion-apsa1301

Official

Attempts to exploit an authentication bypass vulnerability in Adobe Coldfusion servers to retrieve a valid administrator's session cookie.

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-adobe-coldfusion-apsa1301

Unofficial

Attempts to exploit an authentication bypass vulnerability (apsa13-01) to retrieve the administrator's session cookie of Adobe Coldfusion servers.

#exploit #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

http-affiliate-id

Official

Grabs affiliate network IDs (e.g. Google AdSense or Analytics, Amazon Associates, etc.) from a web page. These can be used to identify pages with the same owner.

#safe #discovery
Ports: Any Protocols: n/a
View Script Details

Safe

http-apache-negotiation

Official

Checks if the target http server has mod_negotiation enabled. This feature can be leveraged to find hidden resources and spider a web site using fewer requests.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-apache-server-status

Official

Attempts to retrieve the server-status page for Apache webservers that have mod_status enabled. If the server-status page exists and appears to be from mod_status the script will parse useful information such as the system uptime, Apache version and recent HTTP requests.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-aspnet-debug

Official

Determines if a ASP.NET application has debugging enabled using a HTTP DEBUG request.

#vuln #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-auth

Official

Retrieves the authentication scheme and realm of a web service that requires authentication.

#default #auth #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-auth-finder

Official

Spiders a web site to find web pages requiring form-based or HTTP-based authentication. The results are returned in a table with each url and the detected method.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-avaya-ipoffice-users

Official

Attempts to enumerate users in Avaya IP Office systems 7.x.

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-awstatstotals-exec

Official

Exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it (CVE: 2008-3922).

#vuln #intrusive #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-awstatstotals-exec

Unofficial

http-awstatstotals-exec exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it. [CVE: 2008-3922]

#vuln #intrusive #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-awstatstotals-exec

Unofficial

Exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it (CVE: 2008-3922).

#vuln #intrusive #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-axis2-dir-traversal

Official

Exploits a directory traversal vulnerability in Apache Axis2 version 1.4.1 by sending a specially crafted request to the parameter xsd (BID 40343). By default it will try to retrieve the configuration file of the Axis2 service '/conf/axis2.xml' using the path '/axis2/services/' to return the username and password of the admin account.

#vuln #intrusive #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-axis2-dir-traversal

Unofficial

http-axis2-dir-traversal exploits a directory traversal vulnerability in Apache Axis2 version 1.4.1 by sending a specially crafted request to the parameter <code>xsd</code> (OSVDB-59001). By default it will try to retrieve the configuration file of the Axis2 service <code>'/conf/axis2.xml'</code> using the path <code>'/axis2/services/'</code> to return the username and password of the admin account.

#vuln #intrusive #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-axis2-dir-traversal

Unofficial

Exploits a directory traversal vulnerability in Apache Axis2 version 1.4.1 by sending a specially crafted request to the parameter <code>xsd</code> (OSVDB-59001). By default it will try to retrieve the configuration file of the Axis2 service <code>'/conf/axis2.xml'</code> using the path <code>'/axis2/services/'</code> to return the username and password of the admin account.

#vuln #intrusive #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-backup-finder

Official

Spiders a website and attempts to identify backup copies of discovered files. It does so by requesting a number of different combinations of the filename (eg. index.bak, index.html~, copy of index.html).

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-barracuda-dir-traversal

Official

Attempts to retrieve the configuration settings from a Barracuda Networks Spam & Virus Firewall device using the directory traversal vulnerability described at http://seclists.org/fulldisclosure/2010/Oct/119 .

#intrusive #exploit #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-bigip-cookie

Official

Decodes any unencrypted F5 BIG-IP cookies in the HTTP response. BIG-IP cookies contain information on backend systems such as internal IP addresses and port numbers. See here for more info: https://support.f5.com/csp/article/K6917

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-breach

Unofficial

Attempts to partially detect the BREACH HTTP compression vulnerability (CVE-2013-3587).

#default #safe #vuln #aerissecure/nse
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-brute

Official

Performs brute force password auditing against http basic, digest and ntlm authentication.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-brute

Unofficial

Performs brute force password auditing against http basic authentication.

#intrusive #auth #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-brute

Unofficial

Performs brute force password auditing against http basic authentication.

#intrusive #brute #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-cakephp-version

Official

Obtains the CakePHP version of a web application built with the CakePHP framework by fingerprinting default files shipped with the CakePHP framework.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-cakephp-version

Unofficial

Obtains the CakePHP version of a web application built with the CakePHP framework. This script depends on default files shipped with the CakePHP framework.

#discovery #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-cakephp-version

Unofficial

Obtains the CakePHP version of a web application built with the CakePHP framework by fingerprinting default files shipped with the CakePHP framework.

#discovery #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-chrono

Official

Measures the time a website takes to deliver a web page and returns the maximum, minimum and average time it took to fetch a page.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-cisco-anyconnect

Official

Connect as Cisco AnyConnect client to a Cisco SSL VPN and retrieves version and tunnel information.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-coldfusion-subzero

Official

Attempts to retrieve version, absolute path of administration panel and the file 'password.properties' from vulnerable installations of ColdFusion 9 and 10.

#exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-coldfusion-subzero

Unofficial

Attempts to retrieve the version, installation path and password.properties files in vulnerable ColdFusion 9/10 installations.

#exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-comments-displayer

Official

Extracts and outputs HTML and JavaScript comments from HTTP responses.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

http-config-backup

Official

Checks for backups and swap files of common content management system and web server configuration files.

#auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-cookie-flags

Official

Examines cookies set by HTTP services. Reports any session cookies set without the httponly flag. Reports any session cookies set over SSL without the secure flag. If http-enum.nse is also run, any interesting paths found by it will be checked in addition to the root.

#default #safe #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-cors

Official

Tests an http server for Cross-Origin Resource Sharing (CORS), a way for domains to explicitly opt in to having certain methods invoked by another domain.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-cross-domain-policy

Official

Checks the cross-domain policy file (/crossdomain.xml) and the client-acces-policy file (/clientaccesspolicy.xml) in web applications and lists the trusted domains. Overly permissive settings enable Cross Site Request Forgery attacks and may allow attackers to access sensitive data. This script is useful to detect permissive configurations and possible domain names available for purchase to exploit the application.

#safe #external #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-csrf

Official

This script detects Cross Site Request Forgeries (CSRF) vulnerabilities.

#intrusive #exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-custom-title

Unofficial

Shows the title of the default page of a web server. If customtitle argument is give the script searches and only titles matching the provided argument. The script also writes matched output if outputfile argument is provided.

#default #discovery #safe #psc4re/nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-date

Official

Gets the date from HTTP-like services. Also prints how much the date differs from local time. Local time is the time the HTTP request was sent, so the difference includes at least the duration of one RTT.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-default-accounts

Official

Tests for access with default credentials used by a variety of web applications and devices.

#discovery #auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-default-accounts

Unofficial

http-default-accounts tests for access with default credentials in a variety of web applications and devices.

#discovery #auth #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-default-accounts

Unofficial

Tests for access with default credentials used by a variety of web applications and devices.

#discovery #auth #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-devframework

Official

Tries to find out the technology behind the target website.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-dlink-backdoor

Official

Detects a firmware backdoor on some D-Link routers by changing the User-Agent to a "secret" value. Using the "secret" User-Agent bypasses authentication and allows admin access to the router.

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-dombased-xss

Official

It looks for places where attacker-controlled information in the DOM may be used to affect JavaScript execution in certain ways. The attack is explained here: http://www.webappsec.org/projects/articles/071105.shtml

#intrusive #exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-domino-enum-passwords

Official

Attempts to enumerate the hashed Domino Internet Passwords that are (by default) accessible by all authenticated users. This script can also download any Domino ID Files attached to the Person document. Passwords are presented in a form suitable for running in John the Ripper.

#intrusive #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-drupal-enum

Official

Enumerates the installed Drupal modules/themes by using a list of known modules and themes.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-drupal-enum-users

Official

Enumerates Drupal users by exploiting an information disclosure vulnerability in Views, Drupal's most popular module.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-drupal-fingerprint

Unofficial

Checks if a website is running Drupal and possibly detect it's version.

#safe #discovery #hexrom/nse-drupal-fingerprint
Ports: Any Protocols: n/a
View Script Details

Discovery

http-email-harvest

Unofficial

http-email-harvest returns a list of email accounts found in the body text of all URIs found in the web server.

#discovery #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-email-harvest

Unofficial

Spiders a web site and collects e-mail addresses.

#discovery #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-enum

Official

Enumerates directories used by popular web applications and servers.

#discovery #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-enum-telefonica-comtrend-vg-8050

Unofficial

Script to detect disclosure information vulnerability from Comtrend VG 8050 Telefonica Spain.

#default #safe #danilabs/scripts-nse
Ports: Any Protocols: n/a
View Script Details

Default

http-enum-telefonica-homestation

Unofficial

Script to detect disclosure information vulnerability from ADB P.DGA4001N aka (HomeStation) Telefonica Spain.

#default #safe #danilabs/scripts-nse
Ports: Any Protocols: n/a
View Script Details

Default

http-enum-vodafone-hua253s

Unofficial

Script to detect the pre-schooler vulnerability from HG253s v2 Vodafone Spain.

#default #safe #danilabs/scripts-nse
Ports: Any Protocols: n/a
View Script Details

Discovery

http-errors

Official

This script crawls through the website and returns any error pages.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-exif-spider

Official

Spiders a site's images looking for interesting exif data embedded in .jpg files. Displays the make and model of the camera, the date the photo was taken, and the embedded geotag information.

#intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-favicon

Official

Gets the favicon ("favorites icon") from a web page and matches it against a database of the icons of known web applications. If there is a match, the name of the application is printed; otherwise the MD5 hash of the icon data is printed.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-feed

Official

This script crawls through the website to find any rss or atom feeds.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-fetch

Official

The script is used to fetch files from servers.

#safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-fileupload-exploiter

Official

Exploits insecure file upload forms in web applications using various techniques like changing the Content-type header or creating valid image files containing the payload in the comment.

#intrusive #exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-form-brute

Official

Performs brute force password auditing against http form-based authentication.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-form-brute

Unofficial

Performs brute force password auditing against http form-based authentication.

#intrusive #auth #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-form-brute

Unofficial

Performs brute force password auditing against http form-based authentication.

#intrusive #brute #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Fuzzer

http-form-fuzzer

Official

Performs a simple form fuzzing against forms found on websites. Tries strings and numbers of increasing length and attempts to determine if the fuzzing was successful.

#fuzzer #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-frontpage-login

Official

Checks whether target machines are vulnerable to anonymous Frontpage login.

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-frontpage-login

Unofficial

Check if target machines are vulnerable to anonymous Frontpage login.

#vuln #safe #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Default

http-generator

Official

Displays the contents of the "generator" meta tag of a web page (default: /) if there is one.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-git

Official

Checks for a Git repository found in a website's document root /.git/<something>) and retrieves as much repo information as possible, including language/framework, remotes, last commit message, and repository description.

#default #safe #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-gitweb-projects-enum

Official

Retrieves a list of Git projects, owners and descriptions from a gitweb (web interface to the Git revision control system).

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Malware

http-google-malware

Official

Checks if hosts are on Google's blacklist of suspected malware and phishing servers. These lists are constantly updated and are part of Google's Safe Browsing service.

#malware #discovery #safe #external #portrule
Ports: Any Protocols: n/a
View Script Details

Malware

http-google-malware

Unofficial

http-google-malware checks if hosts are on Google's blacklist of suspected malware and phishing servers. These lists are constantly updated and are part of Google's Safe Browsing service.

#malware #discovery #safe #external #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Malware

http-google-malware

Unofficial

Checks if hosts are on Google's blacklist of suspected malware and phishing servers. These lists are constantly updated and are part of Google's Safe Browsing service.

#malware #discovery #safe #external #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-grep

Official

Spiders a website and attempts to match all pages and urls against a given string. Matches are counted and grouped per url under which they were discovered.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-headers

Official

Performs a HEAD request for the root folder ("/") of a web server and displays the HTTP headers returned.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-hp-ilo-info

Official

Attempts to extract information from HP iLO boards including versions and addresses.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-httpoxy

Unofficial

Attempts to detect web applications vulnerable to "httpoxy" (CVE-2016-5385, CVE-2016-5386, CVE-2016-5387, CVE-2016-5388, CVE-2016-1000109, CVE-2016-1000110).

#vuln #exploit #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Exploit

http-huawei-hg5xx-vuln

Official

Detects Huawei modems models HG530x, HG520x, HG510x (and possibly others...) vulnerable to a remote credential and information disclosure vulnerability. It also extracts the PPPoE credentials and other interesting configuration values.

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-huawei-hg5xx-vuln

Unofficial

Detects Huawei modems models HG530x, HG520x, HG510x (and possibly others...) vulnerable to a remote credential and information disclosure vulnerability. It also extracts the PPPoE credentials and other interesting configuration values.

#exploit #version #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Exploit

http-huawei-hg5xx-vuln

Unofficial

Detects Huawei modems models HG530x, HG520x, HG510x (and possibly others...) vulnerable to a remote credential and information disclosure vulnerability. It also extracts the PPPoE credentials and other interesting configuration values.

#exploit #version #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-icloud-findmyiphone

Official

Retrieves the locations of all "Find my iPhone" enabled iOS devices by querying the MobileMe web service (authentication required).

#discovery #safe #external #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-icloud-sendmsg

Official

Sends a message to a iOS device through the Apple MobileMe web service. The device has to be registered with an Apple ID using the Find My Iphone application.

#discovery #safe #external #prerule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-iis-short-name-brute

Official

Attempts to brute force the 8.3 filenames (commonly known as short names) of files and directories in the root folder of vulnerable IIS servers. This script is an implementation of the PoC "iis shortname scanner".

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-iis-short-name-brute

Unofficial

Attempts to brute force the 8.3 filenames (commonly known as short names) of files and directories in the root folder of vulnerable IIS servers. This script is an implementation of the PoC "iis shortname scanner".

#intrusive #brute #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Dos

http-iis-shortname-dos

Unofficial

http-iis-shortname-dos launches a Denial of Service attack that exploits a vulnerability in IIS/.NET installations with shortname support enabled.

#dos #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-iis-webdav-vuln

Official

Checks for a vulnerability in IIS 5.1/6.0 that allows arbitrary users to access secured WebDAV folders by searching for a password-protected folder and attempting to access it. This vulnerability was patched in Microsoft Security Bulletin MS09-020, https://nmap.org/r/ms09-020 .

#vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-internal-ip-disclosure

Official

Determines if the web server leaks its internal IP address when sending an HTTP/1.0 request without a Host header.

#vuln #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-joomla-brute

Official

Performs brute force password auditing against Joomla web CMS installations.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-joomla-brute

Unofficial

Performs a brute force password attack against Joomla installations.

#intrusive #auth #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-joomla-brute

Unofficial

Performs brute force password auditing against Joomla web CMS installations.

#intrusive #brute #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

http-jsonp-detection

Official

Attempts to discover JSONP endpoints in web servers. JSONP endpoints can be used to bypass Same-origin Policy restrictions in web browsers.

#safe #vuln #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-lfi

Unofficial

"http-lfi.nse can discover LFI exploit in a web server using the resource value provided. this supports LFI discovery in both windows and linux servers, at the same time, it also supports LFI in private pages using a given cookie value. It hopes 20 times backword in the directory and looks for either boot.ini or /etc/passwd file in the webserver and extract the vulnerable path."

#exploit #intrusive #s4n7h0/nse
Ports: Any Protocols: n/a
View Script Details

Vuln

http-litespeed-sourcecode-download

Official

Exploits a null-byte poisoning vulnerability in Litespeed Web Servers 4.0.x before 4.0.15 to retrieve the target script's source code by sending a HTTP request with a null byte followed by a .txt file extension (CVE-2010-2333).

#vuln #intrusive #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-litespeed-sourcecode-download

Unofficial

http-litespeed-sourcecode-download.nse exploits a null-byte poisoning vulnerability in Litespeed Web Servers 4.0.x before 4.0.15 to retrieve the target script's source code by sending a HTTP request with a null byte followed by a .txt file extension (CVE-2010-2333).

#vuln #intrusive #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-litespeed-sourcecode-download

Unofficial

Exploits a null-byte poisoning vulnerability in Litespeed Web Servers 4.0.x before 4.0.15 to retrieve the target script's source code by sending a HTTP request with a null byte followed by a .txt file extension (CVE-2010-2333).

#vuln #intrusive #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-livestreet-brute

Unofficial

performs brute force password auditing against livestreet CMS installations.

#intrusive #brute #dukebarman/luanmap
Ports: Any Protocols: n/a
View Script Details

Discovery

http-log4shell

Unofficial

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

#discovery #vuln #exploit #s4n7h0/nse
Ports: Any Protocols: n/a
View Script Details

Default

http-ls

Official

Shows the content of an "index" Web page.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-majordomo2-dir-traversal

Official

Exploits a directory traversal vulnerability existing in Majordomo2 to retrieve remote files. (CVE-2011-0049).

#intrusive #vuln #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-majordomo2-dir-traversal

Unofficial

Exploits a directory traversal vulnerability existing in Majordomo2 to retrieve remote files. (CVE-2011-0049).

#intrusive #vuln #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-majordomo2-dir-traversal

Unofficial

Exploits a directory traversal vulnerability existing in Majordomo2 to retrieve remote files. (CVE-2011-0049).

#intrusive #vuln #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Malware

http-malware-host

Official

Looks for signature of known server compromises.

#malware #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-mcmp

Official

Checks if the webserver allows mod_cluster management protocol (MCMP) methods.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

http-method-tamper

Official

Attempts to bypass password protected resources (HTTP 401 status) by performing HTTP verb tampering. If an array of paths to check is not set, it will crawl the web server and perform the check against any password protected resource that it finds.

#auth #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-method-tamper

Unofficial

Attempts to bypass password protected resources (HTTP 401 status) by performing HTTP verb tampering. If an array of paths to check is not set, it will crawl the web server and perform the check against any password protected resource that it finds.

#safe #auth #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Default

http-methods

Official

Finds out what options are supported by an HTTP server by sending an OPTIONS request. Lists potentially risky methods. It tests those methods not mentioned in the OPTIONS headers individually and sees if they are implemented. Any output other than 501/405 suggests that the method is if not in the range 400 to 600. If the response falls under that range then it is compared to the response from a randomly generated method.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-mobileversion-checker

Official

Checks if the website holds a mobile version.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Community

http-nikto-scan

Unofficial

"This script will run nikto on web servers found"

#s4n7h0/nse
Ports: Any Protocols: n/a
View Script Details

Default

http-ntlm-info

Official

This script enumerates information from remote HTTP services with NTLM authentication enabled.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-open-proxy

Official

Checks if an HTTP proxy is open.

#default #discovery #external #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-open-redirect

Official

Spiders a website and attempts to identify open redirects. Open redirects are handlers which commonly take a URL as a parameter and responds with a HTTP redirect (3XX) to the target. Risks of open redirects are described at http://cwe.mitre.org/data/definitions/601.html .

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-passwd

Official

Checks if a web server is vulnerable to directory traversal by attempting to retrieve /etc/passwd or \boot.ini .

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-php-version

Official

Attempts to retrieve the PHP version from a web server. PHP has a number of magic queries that return images or text that can vary with the PHP version. This script uses the following queries: /?=PHPE9568F36-D428-11d2-A769-00AA001ACF42 : gets a GIF logo, which changes on April Fool's Day. /?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000 : gets an HTML credits page. A list of magic queries is at http://www.0php.com/php_easter_egg.php . The script also checks if any header field value starts with "PHP" and reports that value if found.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-phpmyadmin-dir-traversal

Official

Exploits a directory traversal vulnerability in phpMyAdmin 2.6.4-pl1 (and possibly other versions) to retrieve remote files on the web server.

#vuln #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Fuzzer

http-phpself-xss

Official

Crawls a web server and attempts to find PHP files vulnerable to reflected cross site scripting via the variable $_SERVER["PHP_SELF"] .

#fuzzer #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-phpself-xss

Unofficial

Crawls a web server looking for PHP files that use the variable $_SERVER["PHP_SELF"] unsafely.

#discovery #intrusive #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Fuzzer

http-phpself-xss

Unofficial

Crawls a web server and attempts to find PHP files vulnerable to reflected cross site scripting via the variable $_SERVER["PHP_SELF"].

#fuzzer #intrusive #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-phpselfxss-scan

Unofficial

Crawls a web server looking for PHP files vulnerable to PHP_SELF cross site scripting vulnerabilities.

#vuln #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Brute

http-proxy-brute

Official

Performs brute force password guessing against HTTP proxy servers.

#brute #intrusive #external #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-put

Official

Uploads a local file to a remote web server using the HTTP PUT method. You must specify the filename and URL path with NSE arguments.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-qnap-nas-info

Official

Attempts to retrieve the model, firmware version, and enabled services from a QNAP Network Attached Storage (NAS) device.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-referer-checker

Official

Informs about cross-domain include of scripts. Websites that include external javascript scripts are delegating part of their security to third-party entities.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-rfi-spider

Official

Crawls webservers in search of RFI (remote file inclusion) vulnerabilities. It tests every form field it finds and every parameter of a URL containing a query.

#intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-robots.txt

Official

Checks for disallowed entries in /robots.txt on a web server.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-robtex-reverse-ip

Official

Obtains up to 100 forward DNS names for a target IP address by querying the Robtex service ( https://www.robtex.com/ip-lookup/ ).

#discovery #safe #external #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-robtex-shared-ns

Official

Finds up to 100 domain names which use the same name server as the target by querying the Robtex service at http://www.robtex.com/dns/ .

#discovery #safe #external #prerule #hostrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-rompager-rom0

Unofficial

This exploits /rom-0 information disclosure present in RomPager Embedded Web Server Affected devices include ZTE, TP-Link, ZynOS, Huawei and many others.

#exploit #vuln #kost/nmap-nse
Ports: Any Protocols: n/a
View Script Details

Exploit

http-rompager-xss

Unofficial

URL redirection and reflected XSS vulnerability in Allegro RomPager Web server

#exploit #vuln #kost/nmap-nse
Ports: Any Protocols: n/a
View Script Details

Safe

http-sap-netweaver-leak

Official

Detects SAP Netweaver Portal instances that allow anonymous access to the KM unit navigation page. This page leaks file names, ldap users, etc.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-screenshot

Unofficial

This script uses PhantomJS to connect to all dicovered HTTP services and save a rendered image of the website to a file and print a snippet of the visible text on the rendered page. An HTML file is produced to display all captured images and provide links to their targets

#default #discovery #safe #aerissecure/nse
Ports: Any Protocols: n/a
View Script Details

Default

http-sec-headers

Unofficial

Makes a request to the root folder ("/") of a web server and reports on the security headers that are missing from the data. This script mimics the functionality of https://securityheaders.io and is modeled after http-headers.nse.

#default #discovery #safe #vuln #aerissecure/nse
Ports: Any Protocols: n/a
View Script Details

Discovery

http-security-headers

Official

Checks for the HTTP response headers related to security given in OWASP Secure Headers Project and gives a brief description of the header and its configuration value.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Version

http-server-header

Official

Uses the HTTP Server header for missing version info. This is currently infeasible with version probes because of the need to match non-HTTP services correctly.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-shellshock

Official

Attempts to exploit the "shellshock" vulnerability (CVE-2014-6271 and CVE-2014-7169) in web applications.

#exploit #vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-shellshock

Unofficial

"This script will spider the given URL (or you can give specific URL to test), and test for shell shock vulnerbility by accessible /etc/passwd file on the remote machine.

#exploit #intrusive #s4n7h0/nse
Ports: Any Protocols: n/a
View Script Details

Discover

http-shellshock-spider

Unofficial

http-shellshock-spider

#discover #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discover

http-shellshock-spider

Unofficial

http-shellshock-spider

#discover #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-sitemap

Unofficial

Returns a list of all web pages and files found in the web server.

#discovery #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-sitemap-dump

Unofficial

This script will crawl a web server and display a list of all the files found. This script is useful to determine all the possible file-targets/attack-surface when auditing web applications.

#discovery #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-sitemap-generator

Official

Spiders a web server and displays its directory structure along with number and types of files in each folder. Note that files listed as having an 'Other' extension are ones that have no extension or that are a root document.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Dos

http-slowloris

Official

Tests a web server for vulnerability to the Slowloris DoS attack by launching a Slowloris attack.

#dos #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Dos

http-slowloris

Unofficial

Tests a web server for vulnerability to the Slowloris DoS attack.

#dos #intrusive #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-slowloris-check

Official

Tests a web server for vulnerability to the Slowloris DoS attack without actually launching a DoS attack.

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-slowloris-check

Unofficial

Tests a web server for vulnerability to the Slowloris DoS attack.

#vuln #safe #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-sql-injection

Official

Spiders an HTTP server looking for URLs containing queries vulnerable to an SQL injection attack. It also extracts forms from found websites and tries to identify fields that are vulnerable.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-stored-xss

Official

Unfiltered '>' (greater than sign). An indication of potential XSS vulnerability.

#intrusive #exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-svn-enum

Official

Enumerates users of a Subversion repository by examining logs of most recent commits.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-svn-info

Official

Requests information from a Subversion repository.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-tenda-enum

Unofficial

Tenda W309R allows an attacker to access the configuration detailed with no authentication. Firmware Tested : V5.07.46

#safe #discovery #s4n7h0/nse
Ports: Any Protocols: n/a
View Script Details

Default

http-title

Official

Shows the title of the default page of a web server.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-tomcat-brute

Unofficial

Performs a brute force password attack against Apache Tomcat installations.

#default #auth #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-tplink-dir-traversal

Official

Exploits a directory traversal vulnerability existing in several TP-Link wireless routers. Attackers may exploit this vulnerability to read any of the configuration and password files remotely and without authentication.

#vuln #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-tplink-dir-traversal

Unofficial

Exploits a directory traversal vulnerability existing in several TP-Link wireless routers. Attackers may exploit this vulnerability to read any of the configuration and password files remotely and without authentication.

#vuln #exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-trace

Official

Sends an HTTP TRACE request and shows if the method TRACE is enabled. If debug is enabled, it returns the header fields that were modified in the response.

#vuln #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-trace

Unofficial

Sends an HTTP TRACE request and shows if the method TRACE is enabled. If debug is enabled, it returns the header fields that were modified in the response.

#vuln #discovery #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-trace

Unofficial

Sends an HTTP TRACE request and shows if the method TRACE is enabled. If debug is enabled, it returns the header fields that were modified in the response.

#vuln #discovery #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-traceroute

Official

Exploits the Max-Forwards HTTP header to detect the presence of reverse proxies.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-trane-info

Official

Attempts to obtain information from Trane Tracer SC devices. Trane Tracer SC is an intelligent field panel for communicating with HVAC equipment controllers deployed across several sectors including commercial facilities and others.

#discovery #version #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-trendnet-tvip110w

Unofficial

Attempts to find Trendnet TVIP110W webcams vulnerable to unauthenticated access to the video stream by querying the URI "/anony/mjpg.cgi".

#exploit #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-unsafe-output-escaping

Official

Spiders a website and attempts to identify output escaping problems where content is reflected back to the user. This script locates all parameters, ?x=foo&y=bar and checks if the values are reflected on the page. If they are indeed reflected, the script will try to insert ghz>hzx"zxc'xcv and check which (if any) characters were reflected back onto the page without proper html escaping. This is an indication of potential XSS vulnerability.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-useragent-tester

Official

Checks if various crawling utilities are allowed by the host.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

http-userdir-enum

Official

Attempts to enumerate valid usernames on web servers running with the mod_userdir module or similar enabled.

#auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-vhosts

Official

Searches for web virtual hostnames by making a large number of HEAD requests against http servers using common hostnames.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-virustotal

Official

Checks whether a file has been determined as malware by Virustotal. Virustotal is a service that provides the capability to scan a file or check a checksum against a number of the major antivirus vendors. The script uses the public API which requires a valid API key and has a limit on 4 queries per minute. A key can be acquired by registering as a user on the virustotal web page: http://www.virustotal.com The scripts supports both sending a file to the server for analysis or checking whether a checksum (supplied as an argument or calculated from a local file) was previously discovered as malware.

#safe #malware #external #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-vlcstreamer-ls

Official

Connects to a VLC Streamer helper service and lists directory contents. The VLC Streamer helper service is used by the iOS VLC Streamer application to enable streaming of multimedia content from the remote server to the device.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vmware-path-vuln

Official

Checks for a path-traversal vulnerability in VMWare ESX, ESXi, and Server (CVE-2009-3733).

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-vuln-cve-2020-0688

Unofficial

Check for OWA and checks banner of Exchange server for CVE-2020-0688. Original source code here : https://github.com/onSec-fr/CVE-2020-0688-Scanner/

#default #discovery #safe #exploit #k4nfr3/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2006-3392

Official

Exploits a file disclosure vulnerability in Webmin (CVE-2006-3392)

#exploit #vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2009-3960

Official

Exploits cve-2009-3960 also known as Adobe XML External Entity Injection.

#exploit #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

http-vuln-cve2010-0738

Official

Tests whether a JBoss target is vulnerable to jmx console authentication bypass (CVE-2010-0738).

#safe #auth #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-vuln-cve2010-2861

Official

Executes a directory traversal attack against a ColdFusion server and tries to grab the password hash for the administrator user. It then uses the salt value (hidden in the web page) to create the SHA1 HMAC hash that the web server needs for authentication as admin. You can pass this value to the ColdFusion server as the admin without cracking the password hash.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2011-3192

Official

Detects a denial of service vulnerability in the way the Apache web server handles requests for multiple overlapping/simple ranges of a page.

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-vuln-cve2011-3368

Official

Tests for the CVE-2011-3368 (Reverse Proxy Bypass) vulnerability in Apache HTTP server's reverse proxy mode. The script will run 3 tests: the loopback test, with 3 payloads to handle different rewrite rules the internal hosts test. According to Contextis, we expect a delay before a server error. The external website test. This does not mean that you can reach a LAN ip, but this is a relevant issue anyway.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2012-1823

Official

Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This critical vulnerability allows attackers to retrieve source code and execute code remotely.

#exploit #vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2012-1823

Unofficial

Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This vulnerability is critical and it allows attackers to retrieve source code and execute code remotely.

#exploit #vuln #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2012-1823

Unofficial

Detects PHP-CGI installations that are vulnerable to CVE-2012-1823, This critical vulnerability allows attackers to retrieve source code and execute code remotely.

#exploit #vuln #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2013-0156

Official

Detects Ruby on Rails servers vulnerable to object injection, remote command executions and denial of service attacks. (CVE-2013-0156)

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2013-0156

Unofficial

Detects Ruby on Rails servers vulnerable to object injection, remote command executions and denial of service attacks. (CVE-2013-0156)

#exploit #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2013-6786

Official

Detects a URL redirection and reflected XSS vulnerability in Allegro RomPager Web server. The vulnerability has been assigned CVE-2013-6786.

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-cve2013-7091

Official

An 0 day was released on the 6th December 2013 by rubina119, and was patched in Zimbra 7.2.6.

#exploit #vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2014-2126

Official

Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA ASDM Privilege Escalation Vulnerability (CVE-2014-2126).

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2014-2127

Official

Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA SSL VPN Privilege Escalation Vulnerability (CVE-2014-2127).

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2014-2128

Official

Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA SSL VPN Authentication Bypass Vulnerability (CVE-2014-2128).

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2014-2129

Official

Detects whether the Cisco ASA appliance is vulnerable to the Cisco ASA SIP Denial of Service Vulnerability (CVE-2014-2129).

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2014-3704

Official

Exploits CVE-2014-3704 also known as 'Drupageddon' in Drupal. Versions < 7.32 of Drupal core are known to be affected.

#vuln #intrusive #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2014-8877

Official

Exploits a remote code injection vulnerability (CVE-2014-8877) in Wordpress CM Download Manager plugin. Versions <= 2.0.0 are known to be affected.

#vuln #intrusive #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2015-1427

Official

This script attempts to detect a vulnerability, CVE-2015-1427, which allows attackers to leverage features of this API to gain unauthenticated remote code execution (RCE).

#vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2015-1635

Official

Checks for a remote code execution vulnerability (MS15-034) in Microsoft Windows systems (CVE2015-2015-1635).

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2015-1635

Unofficial

Checks for a remote code execution vulnerability (MS15-034) in Microsoft Windows systems (CVE2015-2015-1635).

#vuln #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2017-1001000

Official

Attempts to detect a privilege escalation vulnerability in Wordpress 4.7.0 and 4.7.1 that allows unauthenticated users to inject content in posts.

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2017-5638

Official

Detects whether the specified URL is vulnerable to the Apache Struts Remote Code Execution Vulnerability (CVE-2017-5638).

#vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2017-5689

Official

Detects if a system with Intel Active Management Technology is vulnerable to the INTEL-SA-00075 privilege escalation vulnerability (CVE2017-5689).

#vuln #auth #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-cve2017-8917

Official

An SQL Injection vulnerability affecting Joomla! 3.7.x before 3.7.1 allows for unauthenticated users to execute arbitrary SQL commands. This vulnerability was caused by a new component, com_fields , which was introduced in version 3.7. This component is publicly accessible, which means this can be exploited by any malicious individual visiting the site.

#vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

http-vuln-exchange

Unofficial

Check for Exchange Server CVEs CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065 using Outlook Web App path data.

#default #discovery #safe #exploit #gossithedog/scanning
Ports: Any Protocols: n/a
View Script Details

Default

http-vuln-exchange-proxyshell

Unofficial

Check for Exchange Server CVE-2021-34473 by trying to access OWA as NT AUTHORITY\SYSTEM Known issues - requires a valid SSL certificate if using SSL/TLS

#default #discovery #safe #exploit #gossithedog/scanning
Ports: Any Protocols: n/a
View Script Details

Vuln

http-vuln-misfortune-cookie

Official

Detects the RomPager 4.07 Misfortune Cookie vulnerability by safely exploiting it.

#vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

http-vuln-wnr1000-creds

Official

A vulnerability has been discovered in WNR 1000 series that allows an attacker to retrieve administrator credentials with the router interface. Tested On Firmware Version(s): V1.0.2.60_60.0.86 (Latest) and V1.0.2.54_60.0.82NA

#exploit #vuln #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-waf-detect

Official

Attempts to determine whether a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-waf-detect

Unofficial

Determines if a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.

#discovery #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-waf-detect

Unofficial

Attempts to determine whether a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.

#discovery #intrusive #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-waf-fingerprint

Official

Tries to detect the presence of a web application firewall and its type and version.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-waf-test

Unofficial

Tries to detect the presence of a web application firewall and its type and version.

#discovery #safe #vladrico/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

http-webdav-scan

Official

A script to detect WebDAV installations. Uses the OPTIONS and PROPFIND methods.

#safe #discovery #default #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-websphere-console

Unofficial

This script identifies IBM Websphere consoles.

#discovery #default #kost/nmap-nse
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-websphere-console-brute

Unofficial

Performs brute force password auditing against IBM WebSphere Console.

#intrusive #brute #kost/nmap-nse
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-wordpress-brute

Official

performs brute force password auditing against Wordpress CMS/blog installations.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-wordpress-brute

Unofficial

Performs a brute force password attack against Wordpress installations.

#intrusive #auth #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

http-wordpress-brute

Unofficial

performs brute force password auditing against Wordpress CMS/blog installations.

#intrusive #brute #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-wordpress-enum

Official

Enumerates themes and plugins of Wordpress installations. The script can also detect outdated plugins by comparing version numbers with information pulled from api.wordpress.org.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

http-wordpress-enum

Unofficial

Enumerates usernames in Wordpress blog/CMS installations by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.

#auth #intrusive #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Default

http-wordpress-info

Unofficial

Finds the WordPress version, theme and plugins observed in the page response. - WordPress version tests for a meta generator html tag, if this is not found an attempt is made to match version in page HTML or /feed/atom/ a default page in all versions of WordPress. - Theme is determined by searching HTML resposne for /wp-content/themes/$themename - Discovered plugins are those that match /wp-content/plugins/$pluginname in the HTML response. This will not find all plugins, to find all plugins you will need the http-wordpress-plugins nse script to brute force the plugin paths. - Additional checks are performed to match comments or other identifiers in the HTML for known plugins.

#default #discovery #safe #hackertarget/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-wordpress-plugins

Unofficial

Tries to obtain a list of installed WordPress plugins by brute force testing for known plugins.

#discovery #intrusive #hackertarget/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

http-wordpress-themes

Unofficial

Discover a list of installed WordPress themes. Brute force of the theme path /wp-content/themes/$themename/ testing for known themes. As seen in the widespread timthumb vulnerability themes installed but not activated can still be exploited.

#discovery #intrusive #hackertarget/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Auth

http-wordpress-users

Official

Enumerates usernames in Wordpress blog/CMS installations by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.

#auth #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

http-wp-enum

Unofficial

http-wp-enum enumerates usernames in Wordpress installations by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.

#discovery #auth #intrusive #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

http-xssed

Official

This script searches the xssed.com database and outputs the result.

#safe #external #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

httpcs_docker-daemontcp-prod

Unofficial

Utilizing Docker via unprotected tcp socket (2375/tcp, maybe 2376/tcp), an attacker can create a Docker container with the '/' path mounted with read/write permissions on the host server that is running the Docker container. As the Docker container executes command as uid 0 it is honored by the host operating system allowing the attacker to edit/create files owned by root. This exploit abuses this to creates a cron job in the '/etc/cron.d/' path of the host server. The Docker image should exist on the target system or be a valid image from hub.docker.com.

#default #discovery #safe #version #vladrico/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Version

https-redirect

Official

Check for HTTP services that redirect to the HTTPS on the same port.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

huawei5xx-udp-info

Unofficial

Tries to obtain the PPPoE credentials, MAC address, firmware version and IP information of the aDSL modems Huawei Echolife 520, 520b, 530 and possibly others by exploiting an information disclosure vulnerability via UDP.

#intrusive #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

huawei5xx-udp-info

Unofficial

Tries to obtain the PPPoE credentials, MAC address, firmware version and IP information of the aDSL modems Huawei Echolife 520, 520b, 530 and possibly others by exploiting an information disclosure vulnerability via UDP.

#intrusive #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

iax2-brute

Official

Performs brute force password auditing against the Asterisk IAX2 protocol. Guessing fails when a large number of attempts is made due to the maxcallnumber limit (default 2048). In case your getting "ERROR: Too many retries, aborted ..." after a while, this is most likely what's happening. In order to avoid this problem try: - reducing the size of your dictionary - use the brute delay option to introduce a delay between guesses - split the guessing up in chunks and wait for a while between them

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Version

iax2-version

Official

Detects the UDP IAX2 service.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

icap-info

Official

Tests a list of known ICAP service names and prints information about any it detects. The Internet Content Adaptation Protocol (ICAP) is used to extend transparent proxy servers and is generally used for content filtering and antivirus scanning.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

iec-identify

Official

Attempts to identify IEC 60870-5-104 ICS protocol.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

iec61850-mms

Official

Queries a IEC 61850-8-1 MMS server. Sends Initate-Request, Identify-Request and Read-Request to LN0 and LPHD.

#discovery #intrusive #version #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

IIS-CVE-2010-2731

Unofficial

Module Author: r00t-3xp10it NSE script to detect if target [ip]:[port][/url] its affected by CVE-2010-2731 (Directory Listing Denied) This module bypasses Directory Listing protections for Internet Information Services (microsoft-IIS/5.1 to 7.5 & nginx 0.7.52 to 1.3.0). By appending a payload to the end of the directory name in a request, it is possible to access webserver protected directorys. nse arguments available: verbose=true (automatic display target body) agent=User-Agent (User-Agent string to send in probes) | uri=directory to scan (If none uri its inputed then this script tests a List of default [/url's] available in our database to brute force folder names). This nse script will auto-execute if the categorie it belongs its called (eg. --script=vuln) <-- run all vuln categorie scripts.

#safe #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Safe

IIS-CVE-2010-2731

Unofficial

Module Author: r00t-3xp10it NSE script to detect if target [ip]:[port][/url] its affected by CVE-2010-2731 (Directory Listing Denied) This module bypasses Directory Listing protections for Internet Information Services (microsoft-IIS/5.1 to 7.5 & nginx 0.7.52 to 1.3.0). By appending a payload to the end of the directory name in a request, it is possible to access webserver protected directorys. nse arguments available: verbose=true (automatic display target body) agent=User-Agent (User-Agent string to send in probes) | uri=directory to scan (If none uri its inputed then this script tests a List of default [/url's] available in our database to brute force folder names). This nse script will auto-execute if the categorie it belongs its called (eg. --script=vuln) <-- run all vuln categorie scripts.

#safe #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Default

ike-mode

Unofficial

Obtains information (such as vendor and device type where available) from an IKE service by sending four packets to the host. This scripts tests with both Main and Aggressive Mode and sends multiple transforms per request.

#default #discovery #safe #version #aerissecure/nse
Ports: Any Protocols: n/a
View Script Details

Default

ike-version

Official

Obtains information (such as vendor and device type where available) from an IKE service by sending four packets to the host. This scripts tests with both Main and Aggressive Mode and sends multiple transforms per request.

#default #discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

imap-brute

Official

Performs brute force password auditing against IMAP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

imap-capabilities

Official

Retrieves IMAP email server capabilities.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

imap-ntlm-info

Official

This script enumerates information from remote IMAP services with NTLM authentication enabled.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

impress-remote-discover

Official

Tests for the presence of the LibreOffice Impress Remote server. Checks if a PIN is valid if provided and will bruteforce the PIN if requested.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

informix-brute

Official

Performs brute force password auditing against IBM Informix Dynamic Server.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

informix-query

Official

Runs a query against IBM Informix Dynamic Server using the given authentication credentials (see also: informix-brute).

#intrusive #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

informix-tables

Official

Retrieves a list of tables and column definitions for each database on an Informix server.

#intrusive #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

ip-forwarding

Official

Detects whether the remote device has ip forwarding or "Internet connection sharing" enabled, by sending an ICMP echo request to a given target using the scanned host as default gateway.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ip-geolocation-geoplugin

Official

Tries to identify the physical location of an IP address using the Geoplugin geolocation web service ( http://www.geoplugin.com/ ). There is no limit on lookups using this service.

#discovery #external #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ip-geolocation-ipinfodb

Official

Tries to identify the physical location of an IP address using the IPInfoDB geolocation web service ( http://ipinfodb.com/ip_location_api.php ).

#discovery #external #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

External

ip-geolocation-map-bing

Official

This script queries the Nmap registry for the GPS coordinates of targets stored by previous geolocation scripts and renders a Bing Map of markers representing the targets.

#external #safe #postrule
Ports: Any Protocols: n/a
View Script Details

External

ip-geolocation-map-google

Official

This script queries the Nmap registry for the GPS coordinates of targets stored by previous geolocation scripts and renders a Google Map of markers representing the targets.

#external #safe #postrule
Ports: Any Protocols: n/a
View Script Details

Safe

ip-geolocation-map-kml

Official

This script queries the Nmap registry for the GPS coordinates of targets stored by previous geolocation scripts and produces a KML file of points representing the targets.

#safe #postrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ip-geolocation-maxmind

Official

Tries to identify the physical location of an IP address using a Geolocation Maxmind database file (available from http://www.maxmind.com/app/ip-location ). This script supports queries using all Maxmind databases that are supported by their API including the commercial ones.

#discovery #external #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ip-https-discover

Official

Checks if the IP over HTTPS (IP-HTTPS) Tunneling Protocol [1] is supported.

#discovery #safe #default #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ip-https-discover

Unofficial

IP-HTTPS sends Teredo related IPv6 packets over an IPv4-based HTTPS session.

#discovery #safe #default #takeshixx/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

ipidseq

Official

Classifies a host's IP ID sequence (test for susceptibility to idle scan).

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

ipmi-brute

Official

Performs brute force password auditing against IPMI RPC server.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

ipmi-cipher-zero

Official

IPMI 2.0 Cipher Zero Authentication Bypass Scanner. This module identifies IPMI 2.0 compatible systems that are vulnerable to an authentication bypass vulnerability through the use of cipher zero.

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ipmi-version

Official

Performs IPMI Information Discovery through Channel Auth probes.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Broadcast

ipv6-multicast-mld-list

Official

Uses Multicast Listener Discovery to list the multicast addresses subscribed to by IPv6 multicast listeners on the link-local scope. Addresses in the IANA IPv6 Multicast Address Space Registry have their descriptions listed.

#broadcast #discovery #prerule
Ports: Any Protocols: n/a
View Script Details

Default

ipv6-node-info

Official

Obtains hostnames, IPv4 and IPv6 addresses through IPv6 Node Information Queries.

#default #discovery #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Dos

ipv6-ra-flood

Official

Generates a flood of Router Advertisements (RA) with random source MAC addresses and IPv6 prefixes. Computers, which have stateless autoconfiguration enabled by default (every major OS), will start to compute IPv6 suffix and update their routing table to reflect the accepted announcement. This will cause 100% CPU usage on Windows and platforms, preventing to process other application requests.

#dos #intrusive #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

irc-botnet-channels

Official

Checks an IRC server for channels that are commonly used by malicious botnets.

#discovery #vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

irc-brute

Official

Performs brute force password auditing against IRC (Internet Relay Chat) servers.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

irc-info

Official

Gathers information from an IRC server.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

irc-sasl-brute

Official

Performs brute force password auditing against IRC (Internet Relay Chat) servers supporting SASL authentication.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

irc-unrealircd-backdoor

Official

Checks if an IRC server is backdoored by running a time-based command (ping) and checking how long it takes to respond.

#exploit #intrusive #malware #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

iscsi-brute

Official

Performs brute force password auditing against iSCSI targets.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

iscsi-info

Official

Collects and displays information from remote iSCSI targets.

#default #safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

isns-info

Official

Lists portals and iSCSI nodes registered with the Internet Storage Name Service (iSNS).

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

jdwp-exec

Official

Attempts to exploit java's remote debugging port. When remote debugging port is left open, it is possible to inject java bytecode and achieve remote code execution. This script abuses this to inject and execute a Java class file that executes the supplied shell command and returns its output.

#exploit #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

jdwp-info

Official

Attempts to exploit java's remote debugging port. When remote debugging port is left open, it is possible to inject java bytecode and achieve remote code execution. This script injects and execute a Java class file that returns remote system information.

#default #safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

jdwp-inject

Official

Attempts to exploit java's remote debugging port. When remote debugging port is left open, it is possible to inject java bytecode and achieve remote code execution. This script allows injection of arbitrary class files.

#exploit #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Version

jdwp-version

Official

Detects the Java Debug Wire Protocol. This protocol is used by Java programs to be debugged via the network. It should not be open to the public Internet, as it does not provide any security against malicious attackers who can inject their own bytecode into the debugged process.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

knx-gateway-discover

Official

Discovers KNX gateways by sending a KNX Search Request to the multicast address 224.0.23.12 including a UDP payload with destination port 3671. KNX gateways will respond with a KNX Search Response including various information about the gateway, such as KNX address and supported services.

#discovery #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

knx-gateway-discover

Unofficial

Discovers KNX gateways by sending a KNX Search Request to the multicast address 224.0.23.12 including a UDP payload with destination port 3671. KNX gateways will respond with a KNX Search Response including various information about the gateway, such as KNX address and supported services.

#discovery #safe #broadcast #takeshixx/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Default

knx-gateway-info

Official

Identifies a KNX gateway on UDP port 3671 by sending a KNX Description Request.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

knx-gateway-info

Unofficial

Identifies a KNX gateway on UDP port 3671 by sending a KNX Description Request.

#default #discovery #safe #takeshixx/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Auth

krb5-enum-users

Official

Discovers valid usernames by brute force querying likely usernames against a Kerberos service. When an invalid username is requested the server will respond using the Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine that the user name was invalid. Valid user names will illicit either the TGT in a AS-REP response or the error KRB5KDC_ERR_PREAUTH_REQUIRED, signaling that the user is required to perform pre authentication.

#auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

lantronix-77feh-info

Unofficial

Attempts to get basic info and server status from a Lantronix devices.

#default #discovery #safe #kost/nmap-nse
Ports: Any Protocols: n/a
View Script Details

Intrusive

ldap-brute

Official

Attempts to brute-force LDAP authentication. By default it uses the built-in username and password lists. In order to use your own lists use the userdb and passdb script arguments.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ldap-novell-getpass

Official

Universal Password enables advanced password policies, including extended characters in passwords, synchronization of passwords from eDirectory to other systems, and a single password for all access to eDirectory.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ldap-rootdse

Official

Retrieves the LDAP root DSA-specific Entry (DSE)

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ldap-search

Official

Attempts to perform an LDAP search and returns all matches.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

lexmark-config

Official

Retrieves configuration information from a Lexmark S300-S400 printer.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

llmnr-resolve

Official

Resolves a hostname by using the LLMNR (Link-Local Multicast Name Resolution) protocol.

#discovery #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

lltd-discovery

Official

Uses the Microsoft LLTD protocol to discover hosts on a local network.

#broadcast #discovery #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Vuln

log4shell

Unofficial

Log4Shell - CVE-2021-44228

#vuln #safe #external #giterlizzi/nmap-log4shell
Ports: Any Protocols: n/a
View Script Details

Intrusive

lu-enum

Official

Attempts to enumerate Logical Units (LU) of TN3270E servers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

maxdb-info

Official

Retrieves version and database information from a SAP Max DB database.

#default #version #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Version

mcafee-epo-agent

Official

Check if ePO agent is running on port 8081 or port identified as ePO Agent port.

#version #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

membase-brute

Official

Performs brute force password auditing against Couchbase Membase servers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

membase-http-info

Official

Retrieves information (hostname, OS, uptime, etc.) from the CouchBase Web Administration port. The information retrieved by this script does not require any credentials.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

memcached-info

Official

Retrieves information (including system architecture, process ID, and server time) from distributed memory object caching system memcached.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

metasploit-info

Official

Gathers info from the Metasploit rpc service. It requires a valid login pair. After authentication it tries to determine Metasploit version and deduce the OS type. Then it creates a new console and executes few commands to get additional info.

#intrusive #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

metasploit-info

Unofficial

Script gathers info from the Metasploit rpc service. It requires a valid login pair. After authentication it tries to determine Metasploit version and deduce the OS type. Then it creates a new console and executes few commands to get additional info. References: * http://wiki.msgpack.org/display/MSGPACK/Format+specification * https://community.rapid7.com/docs/DOC-1516 Metasploit RPC API Guide

#intrusive #safe #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

metasploit-msgrpc-brute

Official

Performs brute force username and password auditing against Metasploit msgrpc interface.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

metasploit-msgrpc-brute

Unofficial

Performs brute force username and password guessing against Metasploit msgrpc interface.

#intrusive #brute #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

metasploit-xmlrpc-brute

Official

Performs brute force password auditing against a Metasploit RPC server using the XMLRPC protocol.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mikrotik-routeros-brute

Official

Performs brute force password auditing against Mikrotik RouterOS devices with the API RouterOS interface enabled.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

mikrotik-routeros-brute

Unofficial

Performs brute force password auditing against Mikrotik RouterOS devices with the API RouterOS interface enabled.

#discovery #brute #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

mikrotik-routeros-username-brute

Official

Attempts to enumerate valid usernames on MikroTik devices running the Winbox service on port 8291 in MikroTik-RouterOS.

#intrusive #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

mikrotik-routeros-version

Official

Detects MikroTik RouterOS version from devices running the Winbox service on port 8291.

#default #version #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mmouse-brute

Official

Performs brute force password auditing against the RPA Tech Mobile Mouse servers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mmouse-exec

Official

Connects to an RPA Tech Mobile Mouse server, starts an application and sends a sequence of keys to it. Any application that the user has access to can be started and the key sequence is sent to the application after it has been started.

#intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

modbus-discover

Official

Enumerates SCADA Modbus slave ids (sids) and collects their device information.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mongodb-brute

Official

Performs brute force password auditing against the MongoDB database.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

mongodb-databases

Official

Attempts to get a list of tables from a MongoDB database.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

mongodb-info

Official

Attempts to get build info and server status from a MongoDB database.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

mop-discover

Unofficial

Detect the Maintenance Operation Protocol (MOP) by sending layer 2 DEC DNA Remote Console hello/test messages. This protocol is e.g. used on Cisco devices (enabled by default on various images).

#default #safe #discovery #takeshixx/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

mqtt-subscribe

Official

Dumps message traffic from MQTT brokers.

#safe #discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

mrinfo

Official

Queries targets for multicast routing information.

#discovery #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Brute

ms-sql-brute

Official

Performs password guessing against Microsoft SQL Server (ms-sql). Works best in conjunction with the broadcast-ms-sql-discover script.

#brute #intrusive
Ports: Any Protocols: n/a
View Script Details

Discovery

ms-sql-config

Official

Queries Microsoft SQL Server (ms-sql) instances for a list of databases, linked servers, and configuration settings.

#discovery #safe
Ports: Any Protocols: n/a
View Script Details

Discovery

ms-sql-dac

Official

Queries the Microsoft SQL Browser service for the DAC (Dedicated Admin Connection) port of a given (or all) SQL Server instance. The DAC port is used to connect to the database instance when normal connection attempts fail, for example, when server is hanging, out of memory or in other bad states. In addition, the DAC port provides an admin with access to system objects otherwise not accessible over normal connections.

#discovery #safe #hostrule #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

ms-sql-dump-hashes

Official

Dumps the password hashes from an MS-SQL server in a format suitable for cracking by tools such as John-the-ripper. In order to do so the user needs to have the appropriate DB privileges.

#auth #discovery #safe
Ports: Any Protocols: n/a
View Script Details

Auth

ms-sql-empty-password

Official

Attempts to authenticate to Microsoft SQL Servers using an empty password for the sysadmin (sa) account.

#auth #intrusive
Ports: Any Protocols: n/a
View Script Details

Auth

ms-sql-hasdbaccess

Official

Queries Microsoft SQL Server (ms-sql) instances for a list of databases a user has access to.

#auth #discovery #safe
Ports: Any Protocols: n/a
View Script Details

Default

ms-sql-info

Official

Attempts to determine configuration and version information for Microsoft SQL Server instances.

#default #discovery #safe
Ports: Any Protocols: n/a
View Script Details

Default

ms-sql-ntlm-info

Official

This script enumerates information from remote Microsoft SQL services with NTLM authentication enabled.

#default #discovery #safe
Ports: Any Protocols: n/a
View Script Details

Discovery

ms-sql-query

Official

Runs a query against Microsoft SQL Server (ms-sql).

#discovery #safe
Ports: Any Protocols: n/a
View Script Details

Discovery

ms-sql-tables

Official

Queries Microsoft SQL Server (ms-sql) for a list of tables per database.

#discovery #safe
Ports: Any Protocols: n/a
View Script Details

Intrusive

ms-sql-xp-cmdshell

Official

Attempts to run a command using the command shell of Microsoft SQL Server (ms-sql).

#intrusive
Ports: Any Protocols: n/a
View Script Details

Vuln

ms15-034

Unofficial

author: DigitalStroopwafel, r00t-3xp10it Detects for the MS15-034 (HTTP.sys) vulnerability on Microsoft IIS servers. and exploit it using script args (--script-args D0S=exploit) or we can scan further using another argument (--script-args uri=/wellcome.png), Affected versions are Windows 7, 8, 8.1, Windows Server 2008 R2, 2012 and 2012R2.

#vuln #dos #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Vuln

ms15-034

Unofficial

author: DigitalStroopwafel, r00t-3xp10it Detects for the MS15-034 (HTTP.sys) vulnerability on Microsoft IIS servers. and exploit it using script args (--script-args D0S=exploit) or we can scan further using another argument (--script-args uri=/wellcome.png), Affected versions are Windows 7, 8, 8.1, Windows Server 2008 R2, 2012 and 2012R2.

#vuln #dos #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Vuln

MS15-034

Unofficial

HTTP.sys Denial of Service(BSoD). This script will check if scanned hosts are vulnerable to CVE-2015-1635 / MS15-034. This script will not cause BSoD. If the hosts are found to be vulnerable, sending request with Range: bytes=18-18446744073709551615 may cause BSoD.

#vuln #safe #s4n7h0/nse
Ports: Any Protocols: n/a
View Script Details

Safe

msrpc-enum

Official

Queries an MSRPC endpoint mapper for a list of mapped services and displays the gathered information.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Safe

msrpc-enum

Unofficial

Script queries MSRPC endpoint mapper for a list of mapped services and displays the gathered information.

#safe #discovery #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

mtrace

Official

Queries for the multicast path from a source to a destination host.

#discovery #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

multicast-profinet-discovery

Official

Sends a multicast PROFINET DCP Identify All message and prints the responses.

#discovery #info #safe #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Version

murmur-version

Official

Detects the Murmur service (server for the Mumble voice communication client) versions 1.2.X.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

mysql-audit

Official

Audits MySQL database server security configuration against parts of the CIS MySQL v1.0.2 benchmark (the engine can be used for other MySQL audits by creating appropriate audit files).

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mysql-auth-bypass

Unofficial

Checks for MySQL servers vulnerable to the authentication bypass CVE-2012-2122 posted to http://seclists.org/oss-sec/2012/q2/493

#intrusive #vulnerability #4armed/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

mysql-brute

Official

Performs password guessing against MySQL.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mysql-brute

Unofficial

Performs password guessing against MySQL.

#intrusive #brute #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

mysql-databases

Official

Attempts to list all databases on a MySQL server.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

mysql-dump-hashes

Official

Dumps the password hashes from an MySQL server in a format suitable for cracking by tools such as John the Ripper. Appropriate DB privileges (root) are required.

#auth #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mysql-empty-password

Official

Checks for MySQL servers with an empty password for root or anonymous .

#intrusive #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

mysql-enum

Official

Performs valid-user enumeration against MySQL server using a bug discovered and published by Kingcope ( http://seclists.org/fulldisclosure/2012/Dec/9 ).

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

mysql-info

Official

Connects to a MySQL server and prints information such as the protocol and version numbers, thread ID, status, capabilities, and the password salt.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

mysql-query

Official

Runs a query against a MySQL database and returns the results as a table.

#auth #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

mysql-users

Official

Attempts to list all users on a MySQL server.

#auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

mysql-variables

Official

Attempts to show all variables on a MySQL server.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

mysql-vuln-cve2012-2122

Official

Attempts to bypass authentication in MySQL and MariaDB servers by exploiting CVE2012-2122. If its vulnerable, it will also attempt to dump the MySQL usernames and password hashes.

#discovery #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

mysql-vuln-cve2012-2122

Unofficial

Attempts to bypass authentication in MySQL and MariaDB servers by exploiting CVE2012-2122. If its vulnerable, it will also attempt to dump the MySQL usernames and password hashes. All MariaDB and MySQL versions up to 5.1.61, 5.2.11, 5.3.5, 5.5.22 are vulnerable but depending if memcmp() returns an arbitrary integer outside of -128..127 range.

#discovery #intrusive #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Default

nat-pmp-info

Official

Gets the routers WAN IP using the NAT Port Mapping Protocol (NAT-PMP). The NAT-PMP protocol is supported by a broad range of routers including: Apple AirPort Express Apple AirPort Extreme Apple Time Capsule DD-WRT OpenWrt v8.09 or higher, with MiniUPnP daemon pfSense v2.0 Tarifa (firmware) (Linksys WRT54G/GL/GS) Tomato Firmware v1.24 or higher. (Linksys WRT54G/GL/GS and many more) Peplink Balance

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

nat-pmp-mapport

Official

Maps a WAN port on the router to a local port on the client using the NAT Port Mapping Protocol (NAT-PMP). It supports the following operations: map - maps a new external port on the router to an internal port of the requesting IP unmap - unmaps a previously mapped port for the requesting IP unmapall - unmaps all previously mapped ports for the requesting IP

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

nbd-info

Official

Displays protocol and block device information from NBD servers.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

nbns-interfaces

Official

Retrieves IP addresses of the target's network interfaces via NetBIOS NS. Additional network interfaces may reveal more information about the target, including finding paths to hidden non-routed networks via multihomed systems.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

nbstat

Official

Attempts to retrieve the target's NetBIOS names and MAC address.

#default #discovery #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Auth

ncp-enum-users

Official

Retrieves a list of all eDirectory users from the Novell NetWare Core Protocol (NCP) service.

#auth #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ncp-serverinfo

Official

Retrieves eDirectory server information (OS version, server name, mounts, etc.) from the Novell NetWare Core Protocol (NCP) service.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ndmp-fs-info

Official

Lists remote file systems by querying the remote device using the Network Data Management Protocol (ndmp). NDMP is a protocol intended to transport data between a NAS device and the backup device, removing the need for the data to pass through the backup server. The following products are known to support the protocol: Amanda Bacula CA Arcserve CommVault Simpana EMC Networker Hitachi Data Systems IBM Tivoli Quest Software Netvault Backup Symantec Netbackup Symantec Backup Exec

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Version

ndmp-version

Official

Retrieves version information from the remote Network Data Management Protocol (ndmp) service. NDMP is a protocol intended to transport data between a NAS device and the backup device, removing the need for the data to pass through the backup server. The following products are known to support the protocol: Amanda Bacula CA Arcserve CommVault Simpana EMC Networker Hitachi Data Systems IBM Tivoli Quest Software Netvault Backup Symantec Netbackup Symantec Backup Exec

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

nessus-brute

Official

Performs brute force password auditing against a Nessus vulnerability scanning daemon using the NTP 1.2 protocol.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

nessus-xmlrpc-brute

Official

Performs brute force password auditing against a Nessus vulnerability scanning daemon using the XMLRPC protocol.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

netbus-auth-bypass

Official

Checks if a NetBus server is vulnerable to an authentication bypass vulnerability which allows full access without knowing the password.

#auth #safe #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

netbus-brute

Official

Performs brute force password auditing against the Netbus backdoor ("remote administration") service.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

netbus-info

Official

Opens a connection to a NetBus server and extracts information about the host and the NetBus service itself.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Version

netbus-version

Official

Extends version detection to detect NetBuster, a honeypot service that mimes NetBus.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

nexpose-brute

Official

Performs brute force password auditing against a Nexpose vulnerability scanner using the API 1.1.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

nfs-ls

Official

Attempts to get useful information about files from NFS exports. The output is intended to resemble the output of ls .

#discovery #safe
Ports: Any Protocols: n/a
View Script Details

Discovery

nfs-showmount

Official

Shows NFS exports, like the showmount -e command.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

nfs-statfs

Official

Retrieves disk space statistics and information from a remote NFS share. The output is intended to resemble the output of df .

#discovery #safe
Ports: Any Protocols: n/a
View Script Details

Intrusive

nje-node-brute

Official

z/OS JES Network Job Entry (NJE) target node name brute force.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

nje-pass-brute

Official

z/OS JES Network Job Entry (NJE) 'I record' password brute forcer.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

nntp-ntlm-info

Official

This script enumerates information from remote NNTP services with NTLM authentication enabled.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

nping-brute

Official

Performs brute force password auditing against an Nping Echo service.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

nrpe-enum

Official

Queries Nagios Remote Plugin Executor (NRPE) daemons to obtain information such as load averages, process counts, logged in user information, etc.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Community

nse-script-template

Unofficial

nse-script-template

#cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Community

nse-script-template

Unofficial

nse-script-template

#cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Default

ntp-info

Official

Gets the time and configuration variables from an NTP server. We send two requests: a time request and a "read variables" (opcode 2) control message. Without verbosity, the script shows the time and the value of the version , processor , system , refid , and stratum variables. With verbosity, all variables are shown.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ntp-monlist

Official

Obtains and prints an NTP server's monitor data.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

omp2-brute

Official

Performs brute force password auditing against the OpenVAS manager using OMPv2.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

omp2-enum-targets

Official

Attempts to retrieve the list of target systems and networks from an OpenVAS Manager server.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

omron-info

Official

This NSE script is used to send a FINS packet to a remote device. The script will send a Controller Data Read Command and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data.

#discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Default

openflow-info

Official

Queries OpenFlow controllers for information. Newer versions of the OpenFlow protocol (1.3 and greater) will return a list of all protocol versions supported by the controller. Versions prior to 1.3 only return their own version number.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

openlookup-info

Official

Parses and displays the banner information of an OpenLookup (network key-value store) server.

#default #discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

openvas-otp-brute

Official

Performs brute force password auditing against a OpenVAS vulnerability scanner daemon using the OTP 1.0 protocol.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

openwebnet-discovery

Official

OpenWebNet is a communications protocol developed by Bticino since 2000. Retrieves device identifying information and number of connected devices.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

oracle-brute

Official

Performs brute force password auditing against Oracle servers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

oracle-brute-stealth

Official

Exploits the CVE-2012-3137 vulnerability, a weakness in Oracle's O5LOGIN authentication scheme. The vulnerability exists in Oracle 11g R1/R2 and allows linking the session key to a password hash. When initiating an authentication attempt as a valid user the server will respond with a session key and salt. Once received the script will disconnect the connection thereby not recording the login attempt. The session key and salt can then be used to brute force the users password.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

oracle-enum-users

Official

Attempts to enumerate valid Oracle user names against unpatched Oracle 11g servers (this bug was fixed in Oracle's October 2009 Critical Patch Update).

#intrusive #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

oracle-sid-brute

Official

Guesses Oracle instance/SID names against the TNS-listener.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Version

oracle-tns-version

Official

Decodes the VSNNUM version number from an Oracle TNS listener.

#version #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Version

ovs-agent-version

Official

Detects the version of an Oracle Virtual Server Agent by fingerprinting responses to an HTTP GET request and an XML-RPC method call.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Default

p2p-conficker

Official

Checks if a host is infected with Conficker.C or higher, based on Conficker's peer to peer communication.

#default #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Safe

path-mtu

Official

Performs simple Path MTU Discovery to target hosts.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

pcanywhere-brute

Official

Performs brute force password auditing against the pcAnywhere remote access protocol.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

pcanywhere-brute

Unofficial

Performs password guessing against pcAnywhere.

#intrusive #brute #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

pcworx-info

Official

This NSE script will query and parse pcworx protocol to a remote PLC. The script will send a initial request packets and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. PCWorx is a protocol and Program by Phoenix Contact.

#discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

pgsql-brute

Official

Performs password guessing against PostgreSQL.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

phpipam

Unofficial

Module Author: r00t-3xp10it Vuln discover: Saeed reza NSE script to detect multiple vulnerabilitys in phpipam (1.2.1 & 1.1.010) versions of open-source web IP address management application (IPAM). by default phpipam.nse searches for phpipam.html on target webserver, If target respondes 200 OK then my script will verify the version installed and If the 2 condictions are true it will display a vulnerable output.

#safe #discovery #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Safe

phpipam

Unofficial

Module Author: r00t-3xp10it Vuln discover: Saeed reza NSE script to detect multiple vulnerabilitys in phpipam (1.2.1 & 1.1.010) versions of open-source web IP address management application (IPAM). by default phpipam.nse searches for phpipam.html on target webserver, If target respondes 200 OK then my script will verify the version installed and If the 2 condictions are true it will display a vulnerable output.

#safe #discovery #vuln #deadjakk/unofficial-nse-repo
Ports: Any Protocols: n/a
View Script Details

Intrusive

pjl-ready-message

Official

Retrieves or sets the ready message on printers that support the Printer Job Language. This includes most PostScript printers that listen on port 9100. Without an argument, displays the current ready message. With the pjl_ready_message script argument, displays the old ready message and changes it to the message given.

#intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

pop3-brute

Official

Tries to log into a POP3 account by guessing usernames and passwords.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

pop3-capabilities

Official

Retrieves POP3 email server capabilities.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

pop3-ntlm-info

Official

This script enumerates information from remote POP3 services with NTLM authentication enabled.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

port-states

Official

Prints a list of ports found in each state.

#safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Version

pptp-version

Official

Attempts to extract system information from the point-to-point tunneling protocol (PPTP) service.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

profinet-cm-lookup

Official

Sends a DCERPC EPM Lookup Request to PROFINET devices. the DCE/RPC Endpoint Mapper (EPM) targeting Profinet Devices.

#discovery #intrusive #prerule
Ports: Any Protocols: n/a
View Script Details

Default

proxyshell

Unofficial

Script by @psc4re for checking against Outlook Exchange Server ProxyShell Vulnerability CVE-2021-34473 Credits: https://twitter.com/bad_packets/status/1426968952278708225 & https://github.com/dinosn/proxyshell for packet info

#default #discovery #safe #psc4re/nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

puppet-naivesigning

Official

Detects if naive signing is enabled on a Puppet server. This enables attackers to create any Certificate Signing Request and have it signed, allowing them to impersonate as a puppet agent. This can leak the configuration of the agents as well as any other sensitive information found in the configuration files.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

qconn-exec

Official

Attempts to identify whether a listening QNX QCONN daemon allows unauthenticated users to execute arbitrary operating system commands.

#intrusive #exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

qscan

Official

Repeatedly probe open and/or closed ports on a host to obtain a series of round-trip time values for each port. These values are used to group collections of ports which are statistically different from other groups. Ports being in different groups (or "families") may be due to network mechanisms such as port forwarding to machines behind a NAT.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Default

quake1-info

Official

Extracts information from Quake game servers and other game servers which use the same protocol.

#default #discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Default

quake3-info

Official

Extracts information from a Quake3 game server and other games which use the same protocol.

#default #discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Default

quake3-master-getservers

Official

Queries Quake3-style master servers for game servers (many games other than Quake 3 use this same protocol).

#default #discovery #safe #portrule #postrule
Ports: Any Protocols: n/a
View Script Details

Discovery

raikia-screenshot

Unofficial

Screenshots each host using their IP, hostname from the lookup, and the hostname the SSL cert is registered to. This script attempts to screenshot with Javascript enabled. If the website takes longer than 20 seconds to load, it will be skipped

#discovery #safe #raikia/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

rdp-enum-encryption

Official

Determines which Security layer and Encryption level is supported by the RDP service. It does so by cycling through all existing protocols and ciphers. When run in debug mode, the script also returns the protocols and ciphers that fail and any errors that were reported.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

rdp-ntlm-info

Official

This script enumerates information from remote RDP services with CredSSP (NLA) authentication enabled.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

rdp-vuln-ms12-020

Official

Checks if a machine is vulnerable to MS12-020 RDP vulnerability.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

rdp-vuln-ms12-020

Unofficial

Checks if a machine is vulnerable to MS12-020 RDP vulnerability.

#intrusive #vuln #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Auth

realvnc-auth-bypass

Official

Checks if a VNC server is vulnerable to the RealVNC authentication bypass (CVE-2006-2369).

#auth #safe #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

redis-brute

Official

Performs brute force passwords auditing against a Redis key-value store.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

redis-info

Official

Retrieves information (such as version number and architecture) from a Redis key-value store.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

resolveall

Official

NOTE: This script has been replaced by the --resolve-all command-line option in Nmap 7.70

#safe #discovery
Ports: Any Protocols: n/a
View Script Details

Safe

reverse-index

Official

Creates a reverse index at the end of scan output showing which hosts run a particular service. This is in addition to Nmap's normal output listing the services on each host.

#safe
Ports: Any Protocols: n/a
View Script Details

Brute

rexec-brute

Official

Performs brute force password auditing against the classic UNIX rexec (remote exec) service.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

rfc868-time

Official

Retrieves the day and time from the Time service.

#discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

riak-http-info

Official

Retrieves information (such as node name and architecture) from a Basho Riak distributed database using the HTTP protocol.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

rlogin-brute

Official

Performs brute force password auditing against the classic UNIX rlogin (remote login) service. This script must be run in privileged mode on UNIX because it must bind to a low source port number.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

rmi-dumpregistry

Official

Connects to a remote RMI registry and attempts to dump all of its objects.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

rmi-vuln-classloader

Official

Tests whether Java rmiregistry allows class loading. The default configuration of rmiregistry allows loading classes from remote URLs, which can lead to remote code execution. The vendor (Oracle/Sun) classifies this as a design feature.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

rmi-vuln-classloader

Unofficial

Checks if rmiregistry allows class loading.

#intrusive #vuln #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Version

rpc-grind

Official

Fingerprints the target RPC port to extract the target service, RPC number and version.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

rpcap-brute

Official

Performs brute force password auditing against the WinPcap Remote Capture Daemon (rpcap).

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

rpcap-info

Official

Connects to the rpcap service (provides remote sniffing capabilities through WinPcap) and retrieves interface information. The service can either be setup to require authentication or not and also supports IP restrictions.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

rpcinfo

Official

Connects to portmapper and fetches a list of all registered programs. It then prints out a table including (for each program) the RPC program number, supported version numbers, port number and protocol, and program name.

#discovery #default #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

rsa-vuln-roca

Official

Detects RSA keys vulnerable to Return Of Coppersmith Attack (ROCA) factorization.

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

rsync-brute

Official

Performs brute force password auditing against the rsync remote file syncing protocol.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

rsync-list-modules

Official

Lists modules available for rsync (remote file sync) synchronization.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

rtsp-methods

Official

Determines which methods are supported by the RTSP (real time streaming protocol) server.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

rtsp-url-brute

Official

Attempts to enumerate RTSP media URLS by testing for common paths on devices such as surveillance IP cameras.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

rusers

Official

Connects to rusersd RPC service and retrieves a list of logged-in users.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

s7-info

Official

Enumerates Siemens S7 PLC Devices and collects their device information. This script is based off PLCScan that was developed by Positive Research and Scadastrangelove ( https://code.google.com/p/plcscan/ ). This script is meant to provide the same functionality as PLCScan inside of Nmap. Some of the information that is collected by PLCScan was not ported over; this information can be parsed out of the packets that are received.

#discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

samba-vuln-cve-2012-1182

Official

Checks if target machines are vulnerable to the Samba heap overflow vulnerability CVE-2012-1182.

#vuln #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Vuln

samba-vuln-cve-2012-1182

Unofficial

Checks if target machines are vulnerable to the Samba heap overflow vulnerability CVE-2012-1182.

#vuln #intrusive #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Default

servicetags

Official

Attempts to extract system information (OS, hardware, etc.) from the Sun Service Tags service agent (UDP port 6481).

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

shodan-api

Official

Queries Shodan API for given targets and produces similar output to a -sV nmap scan. The ShodanAPI key can be set with the 'apikey' script argument, or hardcoded in the .nse file itself. You can get a free key from https://developer.shodan.io

#discovery #safe #external
Ports: Any Protocols: n/a
View Script Details

Default

Siemens-CommunicationsProcessor

Unofficial

Checks for SCADA Siemens <code>S7 Communications Processor </code> devices.

#default #discovery #safe #jpalanco/nmap-scada
Ports: Any Protocols: n/a
View Script Details

Default

Siemens-HMI-miniweb

Unofficial

Checks for SCADA Siemens <code>SIMATIC S7-</code> devices.

#default #discovery #safe #jpalanco/nmap-scada
Ports: Any Protocols: n/a
View Script Details

Default

Siemens-Scalance-module

Unofficial

Checks for SCADA Siemens <code>SCALANCE</code> modules.

#default #discovery #safe #jpalanco/nmap-scada
Ports: Any Protocols: n/a
View Script Details

Default

Siemens-SIMATIC-PLC-S7

Unofficial

Checks for SCADA Siemens <code>Simatic S7</code> devices.

#default #discovery #safe #jpalanco/nmap-scada
Ports: Any Protocols: n/a
View Script Details

Default

Siemens-WINCC

Unofficial

Checks for SCADA Siemens <code>WINCC</code> server.

#default #discovery #safe #jpalanco/nmap-scada
Ports: Any Protocols: n/a
View Script Details

Intrusive

sip-brute

Official

Performs brute force password auditing against Session Initiation Protocol (SIP) accounts. This protocol is most commonly associated with VoIP sessions.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

sip-call-spoof

Official

Spoofs a call to a SIP phone and detects the action taken by the target (busy, declined, hung up, etc.)

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

sip-enum-users

Official

Enumerates a SIP server's valid extensions (users).

#auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

sip-methods

Official

Enumerates a SIP Server's allowed methods (INVITE, OPTIONS, SUBSCRIBE, etc.)

#default #safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Version

skypev2-version

Official

Detects the Skype version 2 service.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-brute

Official

Attempts to guess username/password combinations over SMB, storing discovered combinations for use in other scripts. Every attempt will be made to get a valid list of users and to verify each username before actually using them. When a username is discovered, besides being printed, it is also saved in the Nmap registry so other Nmap scripts can use it. That means that if you're going to run smb-brute.nse , you should run other smb scripts you want. This checks passwords in a case-insensitive way, determining case after a password is found, for Windows versions before Vista.

#intrusive #brute #hostrule
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-double-pulsar-backdoor

Official

Checks if the target machine is running the Double Pulsar SMB backdoor.

#vuln #safe #malware #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-enum-domains

Official

Attempts to enumerate domains on a system, along with their policies. This generally requires credentials, except against Windows 2000. In addition to the actual domain, the "Builtin" domain is generally displayed. Windows returns this in the list of domains, but its policies don't appear to be used anywhere.

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-enum-groups

Official

Obtains a list of groups from the remote Windows system, as well as a list of the group's users. This works similarly to enum.exe with the /G switch.

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-enum-processes

Official

Pulls a list of processes from the remote server over SMB. This will determine all running processes, their process IDs, and their parent processes. It is done by querying the remote registry service, which is disabled by default on Vista; on all other Windows versions, it requires Administrator privileges.

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-enum-services

Official

Retrieves the list of services running on a remote Windows system. Each service attribute contains service name, display name and service status of each service.

#discovery #intrusive #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-enum-sessions

Official

Enumerates the users logged into a system either locally or through an SMB share. The local users can be logged on either physically on the machine, or through a terminal services session. Connections to a SMB share are, for example, people connected to fileshares or making RPC calls. Nmap's connection will also show up, and is generally identified by the one that connected "0 seconds ago".

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-enum-shares

Official

Attempts to list shares using the srvsvc.NetShareEnumAll MSRPC function and retrieve more information about them using srvsvc.NetShareGetInfo . If access to those functions is denied, a list of common share names are checked.

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Auth

smb-enum-users

Official

Attempts to enumerate the users on a remote Windows system, with as much information as possible, through two different techniques (both over MSRPC, which uses port 445 or 139; see smb.lua ). The goal of this script is to discover all user accounts that exist on a remote system. This can be helpful for administration, by seeing who has an account on a server, or for penetration testing or network footprinting, by determining which accounts exist on a system.

#auth #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-flood

Official

Exhausts a remote SMB server's connection limit by by opening as many connections as we can. Most implementations of SMB have a hard global limit of 11 connections for user accounts and 10 connections for anonymous. Once that limit is reached, further connections are denied. This script exploits that limit by taking up all the connections and holding them.

#intrusive #dos #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-ls

Official

Attempts to retrieve useful information about files shared on SMB volumes. The output is intended to resemble the output of the UNIX ls command.

#discovery #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-mbenum

Official

Queries information managed by the Windows Master Browser.

#discovery #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Default

smb-os-discovery

Official

Attempts to determine the operating system, computer name, domain, workgroup, and current time over the SMB protocol (ports 445 or 139). This is done by starting a session with the anonymous account (or with a proper user account, if one is given; it likely doesn't make a difference); in response to a session starting, the server will send back all this information.

#default #discovery #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-print-text

Official

Attempts to print text on a shared printer by calling Print Spooler Service RPC functions.

#intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-print-text

Unofficial

Script calls Print Spooler Service RPC functions to a shared printer to make it print text.

#intrusive #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

smb-protocols

Official

Attempts to list the supported protocols and dialects of a SMB server.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-psexec

Official

Implements remote process execution similar to the Sysinternals' psexec tool, allowing a user to run a series of programs on a remote machine and read the output. This is great for gathering information about servers, running the same tool on a range of system, or even installing a backdoor on a collection of computers.

#intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Default

smb-security-mode

Official

Returns information about the SMB security level determined by SMB.

#default #discovery #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-server-stats

Official

Attempts to grab the server's statistics over SMB and MSRPC, which uses TCP ports 445 or 139.

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb-system-info

Official

Pulls back information about the remote system from the registry. Getting all of the information requires an administrative account, although a user account will still get a lot of it. Guest probably won't get any, nor will anonymous. This goes for all operating systems, including Windows 2000.

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-conficker

Official

Detects Microsoft Windows systems infected by the Conficker worm. This check is dangerous and it may crash systems.

#intrusive #exploit #dos #vuln #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-conficker

Unofficial

Detects Microsoft Windows systems infected by the Conficker worm. This check is dangerous and it may crash systems.

#intrusive #exploit #dos #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-vuln-cve-2017-7494

Official

Checks if target machines are vulnerable to the arbitrary shared library load vulnerability CVE-2017-7494.

#vuln #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Safe

smb-vuln-cve-2020-0796

Unofficial

On 10th March 2020, Microsoft published ADV200005, an advisory for a critical RCE vulnerability in Microsoft Server Message Block 3.1.1 (SMBv3). The vulnerability was initially disclosed accidentally by a vendor’s blogpost related to March 2020 Patch Tuesday. The post was later removed by the vendor, but MalwareHunterTeam seized this accidental disclosure on twitter (https://twitter.com/malwrhunterteam/status/1237438376032251904) According to Microsoft, the vulnerability exists in the way the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target SMB Server or SMB Client. To exploit the vulnerability against an SMB Server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 Server. To exploit the vulnerability against an SMB Client, an unauthenticated attacker would need to configure a malicious SMBv3 Server and convince a user to connect to it.

#safe #discovery #vuln #s4n7h0/nse
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-cve2009-3103

Official

Detects Microsoft Windows systems vulnerable to denial of service (CVE-2009-3103). This script will crash the service if it is vulnerable.

#intrusive #exploit #dos #vuln #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-cve2009-3103

Unofficial

Detects Microsoft Windows systems vulnerable to denial of service (CVE-2009-3103). This script will crash the service if it is vulnerable.

#intrusive #exploit #dos #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-ms06-025

Official

Detects Microsoft Windows systems with Ras RPC service vulnerable to MS06-025.

#intrusive #exploit #dos #vuln #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-ms06-025

Unofficial

Detects Microsoft Windows systems with Ras RPC service vulnerable to MS06-025.

#intrusive #exploit #dos #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-ms07-029

Official

Detects Microsoft Windows systems with Dns Server RPC vulnerable to MS07-029.

#intrusive #exploit #dos #vuln #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-ms07-029

Unofficial

Detects Microsoft Windows systems with Dns Server RPC vulnerable to MS07-029.

#intrusive #exploit #dos #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-ms08-067

Official

Detects Microsoft Windows systems vulnerable to the remote code execution vulnerability known as MS08-067. This check is dangerous and it may crash systems.

#intrusive #exploit #dos #vuln #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-ms08-067

Unofficial

Detects Microsoft Windows systems vulnerable to the remote code execution vulnerability known as MS08-067. This check is dangerous and it may crash systems.

#intrusive #exploit #dos #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-vuln-ms10-054

Official

Tests whether target machines are vulnerable to the ms10-054 SMB remote memory corruption vulnerability.

#vuln #intrusive #dos #hostrule
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-vuln-ms10-054

Unofficial

Checks if target machines are vulnerable to the ms10-054 SMB remote memory corruption vulnerability.

#vuln #intrusive #dos #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-vuln-ms10-061

Official

Tests whether target machines are vulnerable to ms10-061 Printer Spooler impersonation vulnerability.

#vuln #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-vuln-ms10-061

Unofficial

Checks if target machines are vulnerable to ms10-061 Printer Spooler impersonation vulnerability.

#vuln #intrusive #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-vuln-ms17-010

Official

Attempts to detect if a Microsoft SMBv1 server is vulnerable to a remote code execution vulnerability (ms17-010, a.k.a. EternalBlue). The vulnerability is actively exploited by WannaCry and Petya ransomware and other malware.

#vuln #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Vuln

smb-vuln-ms17-010

Unofficial

Attempts to detect if a Microsoft SMBv1 server is vulnerable to a remote code execution vulnerability (ms17-010, a.k.a. EternalBlue). The vulnerability is actively exploited by WannaCry and Petya ransomware and other malware.

#vuln #safe #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-regsvc-dos

Official

Checks if a Microsoft Windows 2000 system is vulnerable to a crash in regsvc caused by a null pointer dereference. This check will crash the service if it is vulnerable and requires a guest account or higher to work.

#intrusive #exploit #dos #vuln #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-regsvc-dos

Unofficial

Checks if a Microsoft Windows 2000 system is vulnerable to a crash in regsvc caused by a null pointer dereference. This check will crash the service if it is vulnerable and requires a guest account or higher to work.

#intrusive #exploit #dos #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-vuln-webexec

Official

A critical remote code execution vulnerability exists in WebExService (WebExec).

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smb-webexec-exploit

Official

Attempts to run a command via WebExService, using the WebExec vulnerability. Given a Windows account (local or domain), this will start an arbitrary executable with SYSTEM privileges over the SMB protocol.

#intrusive #exploit #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

smb2-capabilities

Official

Attempts to list the supported capabilities in a SMBv2 server for each enabled dialect.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Safe

smb2-security-mode

Official

Determines the message signing configuration in SMBv2 servers for all supported dialects.

#safe #discovery #default #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smb2-time

Official

Attempts to obtain the current system date and the start date of a SMB2 server.

#discovery #safe #default #hostrule
Ports: Any Protocols: n/a
View Script Details

Vuln

smb2-vuln-uptime

Official

Attempts to detect missing patches in Windows systems by checking the uptime returned during the SMB2 protocol negotiation.

#vuln #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Brute

smtp-brute

Official

Performs brute force password auditing against SMTP servers using either LOGIN, PLAIN, CRAM-MD5, DIGEST-MD5 or NTLM authentication.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

smtp-commands

Official

Attempts to use EHLO and HELP to gather the Extended commands supported by an SMTP server.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

smtp-dovecot-exim-exec

Unofficial

Attempts to exploit a remote command execution vulnerability in misconfigured Dovecot/Exim mail servers.

#exploit #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Auth

smtp-enum-users

Official

Attempts to enumerate the users on a SMTP server by issuing the VRFY, EXPN or RCPT TO commands. The goal of this script is to discover all the user accounts in the remote system.

#auth #external #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

smtp-ntlm-info

Official

This script enumerates information from remote SMTP services with NTLM authentication enabled.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

smtp-open-relay

Official

Attempts to relay mail by issuing a predefined combination of SMTP commands. The goal of this script is to tell if a SMTP server is vulnerable to mail relaying.

#discovery #intrusive #external #portrule
Ports: Any Protocols: n/a
View Script Details

Malware

smtp-strangeport

Official

Checks if SMTP is running on a non-standard port.

#malware #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

smtp-vuln-cve2010-4344

Official

Checks for and/or exploits a heap overflow within versions of Exim prior to version 4.69 (CVE-2010-4344) and a privilege escalation vulnerability in Exim 4.72 and prior (CVE-2010-4345).

#exploit #intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smtp-vuln-cve2011-1720

Official

Checks for a memory corruption in the Postfix SMTP server when it uses Cyrus SASL library authentication mechanisms (CVE-2011-1720). This vulnerability can allow denial of service and possibly remote code execution.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

smtp-vuln-cve2011-1764

Official

Checks for a format string vulnerability in the Exim SMTP server (version 4.70 through 4.75) with DomainKeys Identified Mail (DKIM) support (CVE-2011-1764). The DKIM logging mechanism did not use format string specifiers when logging some parts of the DKIM-Signature header field. A remote attacker who is able to send emails, can exploit this vulnerability and execute arbitrary code with the privileges of the Exim daemon.

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

sniffer-detect

Official

Checks if a target on a local Ethernet has its network card in promiscuous mode.

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

snmp-brute

Official

Attempts to find an SNMP community string by brute force guessing.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-hh3c-logins

Official

Attempts to enumerate Huawei / HP/H3C Locally Defined Users through the hh3c-user.mib OID

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-info

Official

Extracts basic information from an SNMPv3 GET request. The same probe is used here as in the service version detection scan.

#default #version #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-interfaces

Official

Attempts to enumerate network interfaces through SNMP.

#default #discovery #safe #prerule #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

snmp-ios-config

Official

Attempts to downloads Cisco router IOS configuration files using SNMP RW (v1) and display or save them.

#intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-netstat

Official

Attempts to query SNMP for a netstat like output. The script can be used to identify and automatically add new targets to the scan by supplying the newtargets script argument.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-processes

Official

Attempts to enumerate running processes through SNMP.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-sysdescr

Official

Attempts to extract system information from an SNMP service.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-win32-services

Official

Attempts to enumerate Windows services through SNMP.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-win32-shares

Official

Attempts to enumerate Windows Shares through SNMP.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-win32-software

Official

Attempts to enumerate installed software through SNMP.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

snmp-win32-users

Official

Attempts to enumerate Windows user accounts through SNMP

#default #auth #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

socks-auth-info

Official

Determines the supported authentication mechanisms of a remote SOCKS proxy server. Starting with SOCKS version 5 socks servers may support authentication. The script checks for the following authentication types: 0 - No authentication 1 - GSSAPI 2 - Username and password

#discovery #safe #default #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

socks-brute

Official

Performs brute force password auditing against SOCKS 5 proxy servers.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

socks-open-proxy

Official

Checks if an open socks proxy is running on the target.

#default #discovery #external #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Auth

ssh-auth-methods

Official

Returns authentication methods that a SSH server supports.

#auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

ssh-brute

Official

Performs brute-force password guessing against ssh servers.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

ssh-hostkey

Official

Shows SSH hostkeys.

#safe #default #discovery
Ports: Any Protocols: n/a
View Script Details

Auth

ssh-publickey-acceptance

Official

This script takes a table of paths to private keys, passphrases, and usernames and checks each pair to see if the target ssh server accepts them for publickey authentication. If no keys are given or the known-bad option is given, the script will check if a list of known static public keys are accepted for authentication.

#auth #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

ssh-run

Official

Runs remote command on ssh server and returns command output.

#intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

ssh2-enum-algos

Official

Reports the number of algorithms (for encryption, compression, etc.) that the target SSH2 server offers. If verbosity is set, the offered algorithms are each listed by type.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

sshv1

Official

Checks if an SSH server supports the obsolete and less secure SSH Protocol Version 1.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

ssl-ccs-injection

Official

Detects whether a server is vulnerable to the SSL/TLS "CCS Injection" vulnerability (CVE-2014-0224), first discovered by Masashi Kikuchi. The script is based on the ccsinjection.c code authored by Ramon de C Valle ( https://gist.github.com/rcvalle/71f4b027d61a78c42607 )

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ssl-cert

Official

Retrieves a server's SSL certificate. The amount of information printed about the certificate depends on the verbosity level. With no extra verbosity, the script prints the validity period and the commonName, organizationName, stateOrProvinceName, and countryName of the subject. When present, it also outputs all the subject alternative names.

#default #safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

ssl-cert-intaddr

Official

Reports any private (RFC1918) IPv4 addresses found in the various fields of an SSL service's certificate. These will only be reported if the target address itself is not private. Nmap v7.30 or later is required.

#vuln #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ssl-date

Official

Retrieves a target host's time and date from its TLS ServerHello response.

#discovery #safe #default #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ssl-date

Unofficial

Gets the remote host's time from its TLS ServerHello response.

#discovery #safe #default #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Vuln

ssl-dh-params

Official

Weak ephemeral Diffie-Hellman parameter detection for SSL/TLS services.

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

ssl-enum-ciphers

Official

This script repeatedly initiates SSLv3/TLS connections, each time trying a new cipher or compressor while recording whether a host accepts or rejects it. The end result is a list of all the ciphersuites and compressors that a server accepts.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

ssl-heartbleed

Official

Detects whether a server is vulnerable to the OpenSSL Heartbleed bug (CVE-2014-0160). The code is based on the Python script ssltest.py authored by Katie Stafford (katie@ktpanda.org)

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

ssl-heartbleed-dump

Unofficial

Detects whether a server is vulnerable to the OpenSSL Heartbleed bug (CVE-2014-0160). The code is based on the Python script ssltest.py authored by Jared Stafford (jspenguin@jspenguin.org).

#vuln #safe #takeshixx/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Safe

ssl-known-key

Official

Checks whether the SSL certificate used by a host has a fingerprint that matches an included database of problematic keys.

#safe #discovery #vuln #default #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

ssl-poodle

Official

Checks whether SSLv3 CBC ciphers are allowed (POODLE)

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

sslv2

Official

Determines whether the server supports obsolete and less secure SSLv2, and discovers which ciphers it supports.

#default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

sslv2-drown

Official

Determines whether the server supports SSLv2, what ciphers it supports and tests for CVE-2015-3197, CVE-2016-0703 and CVE-2016-0800 (DROWN)

#intrusive #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

sstp-discover

Official

Check if the Secure Socket Tunneling Protocol is supported. This is accomplished by trying to establish the HTTPS layer which is used to carry SSTP traffic as described in: - http://msdn.microsoft.com/en-us/library/cc247364.aspx

#discovery #default #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

sstp-discover

Unofficial

Check if the Secure Socket Tunneling Protocol is supported. This is accomplished by trying to establish the HTTPS layer which is used to carry SSTP traffic as described in: - http://msdn.microsoft.com/en-us/library/cc247364.aspx

#discovery #default #takeshixx/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

struts2-scan

Unofficial

Struts2 S2-045 Checks

#discovery #safe #z-0ne/scans2-045-nmap
Ports: Any Protocols: n/a
View Script Details

Discovery

stun-info

Official

Retrieves the external IP address of a NAT:ed host using the STUN protocol.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Version

stun-version

Official

Sends a binding request to the server and attempts to extract version information from the response, if the server attribute is present.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

stuxnet-detect

Official

Detects whether a host is infected with the Stuxnet worm ( http://en.wikipedia.org/wiki/Stuxnet ).

#discovery #intrusive #hostrule
Ports: Any Protocols: n/a
View Script Details

Exploit

supermicro-ipmi-conf

Official

Attempts to download an unprotected configuration file containing plain-text user credentials in vulnerable Supermicro Onboard IPMI controllers.

#exploit #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

svn-brute

Official

Performs brute force password auditing against Subversion source code control servers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-asn

Official

Produces a list of IP prefixes for a given routing AS number (ASN).

#discovery #external #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-ipv6-eui64

Official

This script runs in the pre-scanning phase to convert 48-bit MAC addresses to EUI-64 IPv6 addresses, which are often used for auto-configuration. Generated addresses may be added to the scan queue.

#discovery #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-ipv6-map4to6

Official

This script runs in the pre-scanning phase to map IPv4 addresses onto IPv6 networks and add them to the scan queue.

#discovery #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-ipv6-multicast-echo

Official

Sends an ICMPv6 echo request packet to the all-nodes link-local multicast address ( ff02::1 ) to discover responsive hosts on a LAN without needing to individually ping each IPv6 address.

#discovery #broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-ipv6-multicast-invalid-dst

Official

Sends an ICMPv6 packet with an invalid extension header to the all-nodes link-local multicast address ( ff02::1 ) to discover (some) available hosts on the LAN. This works because some hosts will respond to this probe with an ICMPv6 Parameter Problem packet.

#discovery #broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-ipv6-multicast-mld

Official

Attempts to discover available IPv6 hosts on the LAN by sending an MLD (multicast listener discovery) query to the link-local multicast address (ff02::1) and listening for any responses. The query's maximum response delay set to 1 to provoke hosts to respond immediately rather than waiting for other responses from their multicast group.

#discovery #broadcast #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-ipv6-multicast-slaac

Official

Performs IPv6 host discovery by triggering stateless address auto-configuration (SLAAC).

#discovery #broadcast #prerule
Ports: Any Protocols: n/a
View Script Details

Discovery

targets-ipv6-wordlist

Official

Adds IPv6 addresses to the scan queue using a wordlist of hexadecimal "words" that form addresses in a given subnet.

#discovery #prerule
Ports: Any Protocols: n/a
View Script Details

Broadcast

targets-sniffer

Official

Sniffs the local network for a configurable amount of time (10 seconds by default) and prints discovered addresses. If the newtargets script argument is set, discovered addresses are added to the scan queue.

#broadcast #discovery #safe #prerule
Ports: Any Protocols: n/a
View Script Details

Safe

targets-traceroute

Official

Inserts traceroute hops into the Nmap scanning queue. It only functions if Nmap's --traceroute option is used and the newtargets script argument is given.

#safe #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Safe

targets-xml

Official

Loads addresses from an Nmap XML output file for scanning.

#safe #prerule
Ports: Any Protocols: n/a
View Script Details

Version

teamspeak2-version

Official

Detects the TeamSpeak 2 voice communication server and attempts to determine version and configuration information.

#version #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

telnet-brute

Official

Performs brute-force password auditing against telnet servers.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

telnet-encryption

Official

Determines whether the encryption option is supported on a remote telnet server. Some systems (including FreeBSD and the krb5 telnetd available in many Linux distributions) implement this option incorrectly, leading to a remote root vulnerability. This script currently only tests whether encryption is supported, not for that particular vulnerability.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

telnet-ntlm-info

Official

This script enumerates information from remote Microsoft Telnet services with NTLM authentication enabled.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Exploit

tenda-backdoor

Unofficial

Detects a firmware backdoor on some Tenda routers by connecting to a UDP port 7329 and executing a command. By default, it executes /bin/ls and checks for the expected output.

#exploit #vuln #ea/nmap-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

tftp-enum

Official

Enumerates TFTP (trivial file transfer protocol) filenames by testing for a list of common ones.

#discovery #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

tftp-version

Official

Obtains information (such as vendor and device type where available) from a TFTP service by requesting a random filename. Software vendor information is determined by matching the error message against a database of known software.

#default #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

tls-alpn

Official

Enumerates a TLS server's supported application-layer protocols using the ALPN protocol.

#discovery #safe #default #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

tls-nextprotoneg

Official

Enumerates a TLS server's supported protocols by using the next protocol negotiation extension.

#discovery #safe #default #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

tls-ticketbleed

Official

Detects whether a server is vulnerable to the F5 Ticketbleed bug (CVE-2016-9244).

#vuln #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

tn3270-screen

Official

Connects to a tn3270 'server' and returns the screen.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

External

tor-consensus-checker

Official

Checks if a target is a known Tor node.

#external #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Safe

traceroute-geolocation

Official

Lists the geographic locations of each hop in a traceroute and optionally saves the results to a KML file, plottable on Google earth and maps.

#safe #external #discovery #hostrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

tso-brute

Official

TSO account brute forcer.

#intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

tso-enum

Official

TSO User ID enumerator for IBM mainframes (z/OS). The TSO logon panel tells you when a user ID is valid or invalid with the message: IKJ56420I Userid <user ID> not authorized to use TSO .

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

ubiquiti-discovery

Official

Extracts information from Ubiquiti networking devices.

#default #discovery #version #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

unittest

Official

Runs unit tests on all NSE libraries.

#safe #prerule
Ports: Any Protocols: n/a
View Script Details

Safe

unusual-port

Official

Compares the detected service on a port against the expected service for that port number (e.g. ssh on 22, http on 80) and reports deviations. The script requires that a version scan has been run in order to be able to discover what service is actually running on each port.

#safe
Ports: Any Protocols: n/a
View Script Details

Default

upnp-info

Official

Attempts to extract system information from the UPnP service.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

uptime-agent-info

Official

Gets system information from an Idera Uptime Infrastructure Monitor agent.

#safe #default #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

url-snarf

Official

Sniffs an interface for HTTP traffic and dumps any URLs, and their originating IP address. Script output differs from other script as URLs are written to stdout directly. There is also an option to log the results to file.

#safe #prerule
Ports: Any Protocols: n/a
View Script Details

Default

ventrilo-info

Official

Detects the Ventrilo voice communication server service versions 2.1.2 and above and tries to determine version and configuration information. Some of the older versions (pre 3.0.0) may not have the UDP service that this probe relies on enabled by default.

#default #discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

versant-info

Official

Extracts information, including file paths, version and database names from a Versant object database.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

vmauthd-brute

Official

Performs brute force password auditing against the VMWare Authentication Daemon (vmware-authd).

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

vmware-version

Official

Queries VMware server (vCenter, ESX, ESXi) SOAP API to extract the version information.

#discovery #safe #version #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

vnc-brute

Official

Performs brute force password auditing against VNC servers.

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Default

vnc-info

Official

Queries a VNC server for its protocol version and supported security types.

#default #discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

vnc-title

Official

Tries to log into a VNC server and get its desktop name. Uses credentials discovered by vnc-brute, or None authentication types. If realvnc-auth-bypass was run and returned VULNERABLE, this script will use that vulnerability to bypass authentication.

#intrusive #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

voldemort-info

Official

Retrieves cluster and store information from the Voldemort distributed key-value store using the Voldemort Native Protocol.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Intrusive

vtam-enum

Official

Many mainframes use VTAM screens to connect to various applications (CICS, IMS, TSO, and many more).

#intrusive #brute #portrule
Ports: Any Protocols: n/a
View Script Details

Vuln

vulners

Official

For each available CPE the script prints out known vulns (links to the correspondent info) and correspondent CVSS scores.

#vuln #safe #external #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

vulscan

Unofficial

Attempts to discover vulnerabilities by matching information from the version detection engine with databases such as CVE, ExploitDB and Scipvuldb.

#safe #vuln #cldrn/nmap-nse-scripts
Ports: Any Protocols: n/a
View Script Details

Discovery

vuze-dht-info

Official

Retrieves some basic information, including protocol version from a Vuze filesharing node.

#discovery #safe #portrule
Ports: Any Protocols: n/a
View Script Details

Default

wdb-version

Official

Detects vulnerabilities and gathers information (such as version numbers and hardware support) from VxWorks Wind DeBug agents.

#default #safe #version #discovery #vuln #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

web_techno

Unofficial

Find web technology base on wappalyzer.

#discovery #mmpx12/nse-web-techno
Ports: Any Protocols: n/a
View Script Details

Default

weblogic-t3-info

Official

Detect the T3 RMI protocol and Weblogic version

#default #safe #discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details

Discovery

whois-domain

Official

Attempts to retrieve information about the domain name of the target

#discovery #external #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Discovery

whois-ip

Official

Queries the WHOIS services of Regional Internet Registries (RIR) and attempts to retrieve information about the IP Address Assignment which contains the Target IP Address.

#discovery #external #safe #hostrule
Ports: Any Protocols: n/a
View Script Details

Safe

wsdd-discover

Official

Retrieves and displays information from devices supporting the Web Services Dynamic Discovery (WS-Discovery) protocol. It also attempts to locate any published Windows Communication Framework (WCF) web services (.NET 4.0 or later).

#safe #discovery #default #portrule
Ports: Any Protocols: n/a
View Script Details

Default

x11-access

Official

Checks if you're allowed to connect to the X server.

#default #safe #auth #portrule
Ports: Any Protocols: n/a
View Script Details

Safe

xdmcp-discover

Official

Requests an XDMCP (X display manager control protocol) session and lists supported authentication and authorization mechanisms.

#safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Default

xmlrpc-methods

Official

Performs XMLRPC Introspection via the system.listMethods method.

#default #safe #discovery #portrule
Ports: Any Protocols: n/a
View Script Details

Brute

xmpp-brute

Official

Performs brute force password auditing against XMPP (Jabber) instant messaging servers.

#brute #intrusive #portrule
Ports: Any Protocols: n/a
View Script Details

Default

xmpp-info

Official

Connects to XMPP server (port 5222) and collects server information such as: supported auth mechanisms, compression methods, whether TLS is supported and mandatory, stream management, language, support of In-Band registration, server capabilities. If possible, studies server vendor.

#default #safe #discovery #version #portrule
Ports: Any Protocols: n/a
View Script Details