Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Nmap NSE Scripts

Nmap NSE Scripts

The nmap scripting engine (written in LUA) allows users to use a list of pre-written scripts that automate nmap functions or modify them or write your own scripts.

Chapter 9. Nmap Scripting Engine – [nmap.org]

The Nmap Scripting Engine (NSE) is one of Nmap’s most powerful and flexible features. It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. Those scripts are then executed in parallel with the speed and efficiency you expect from Nmap. Users can rely on the growing and diverse set of scripts distributed with Nmap, or write their own to meet custom needs.

Mastering the Nmap Scripting Engine – [insecure.org]

Most hackers can use Nmap for simple port scanning and OS detection, but the Nmap Scripting Engine (NSE) takes scanning to a whole new level. Nmap’s high-speed networking engine can now spider web sites for SQL injection vulnerabilities, brute-force crack and query MSRPC services, find open proxies, and more. Nmap includes more than 125 NSE scripts for network discovery, vulnerability detection, exploitation, and authentication cracking.

NSE Documentation Portal – [nmap.org]

The online NSE Documentation Portal at http://nmap.org/nsedoc/ lists the arguments that each script accepts.

The Nmap scripting engine – [youtube.com]

By David Fifield

The Nmap Scripting Engine extends the results of an Nmap port scan. It combines the Lua programming language, a library of network functions, and the results provided by other parts of Nmap to give more information about network hosts and their open ports.

There are standard scripts that grab SSH host keys or SSL certificates, discover the remote date and time, check for weak passwords and unpatched vulnerabilites, and much more.

The talk will explain how the scripting engine fits in with Nmap’s other functions, the structure of a script, and how to modify a script or write your own. We’ll see how the scripting engine can benefit casual users, researchers, and security auditors. Finally there will be a brief overview of what’s new in Nmap and its associated tools for the benefit of casual users.

New nmap (5.0)
nmap 5.2
…more from the “Tools” category

Comments are closed.