Nmap for Pentester: Vulnerability Scan
2021-02-24 19:01:34 Author: www.hackingarticles.in(查看原文) 阅读量:343 收藏

Introduction

Nmap Scripting Engine (NSE) has been one of the most efficient features of Nmap which lets users prepare and share their scripts to automate the numerous tasks that are involved in networking. As we know about the Nmap’s speed and.  competence, it allows executing these scripts side-by-side. According to the needs of the users, they can pick from the range of available scripts or can create their scripts as per the requirements.

Table of Contents

  • Introduction
  • .nse Scripts
    • ms17-010 Vulnerability
    • Vsftpd backdoor
    • SSL-Poodle Vulnerability
    • Rmi classloader vulnerability
    • HTTP Slowloris vulnerability
  • Nmap-Vulners
  • Conclusion

So, let’s get started with listing all the scripts that are available for discovering the vulnerability. Here we see that a list of scripts are available to detect the vulnerabilities. One by one we will run these scripts and check for vulnerabilities.

cd /usr/share/nmap/scripts/

ls -al *vulns*

ms17-010 Vulnerability

This script detects whether an SMBv1 server in Microsoft systems is vulnerable to the remote code execution which is commonly known as the EternalBlue vulnerability. This vulnerability had been vastly exploited by ransomware like WannaCry. This works on Windows XP, 2003, 7, 8, 8.1, 10, and server 2008, 2012 and 2016.

You see that on executing this script, you see that the system is susceptible to a vulnerability that is at high risk in nature.

nmap --script smb-vuln-ms17-010.nse 192.168.1.16

Vsftpd backdoor

This script checks for the presence of vsFTPd 2.3.4 backdoor vulnerability by attempting to exploit the backdoor using a harmful command.

nmap --script ftp-vsftpd-backdoor -p 21

SSL-Poodle Vulnerability

The SSL Poodle is a Man-in the middle exploit whose purpose is to take advantage of the security software running on SSL. On running this script, you see that the system is vulnerable.

nmap script ssl-poodle 192.168.1.12

Rmi classloader Vulnerability

This script checks whether Java rmiregistry allows class loads or not. The rmiregistry has default configuration which allows the class to load from remote URLs which may lead to remote code execution.

nmap --script=rmi-vuln-classloader -p 1099 192.168.1.12

HTTP Slowloris Vulnerability

It checks for the vulnerability in the web server Slowloris DoS attack where it does not launch an actual DoS attack. This script will open 2 separate connections to the server and then request for URL in base configuration.

nmap script http-slowloris-check 192.168.1.12

SSL-CCS-Injection

This script when run checks if a server is vulnerable to the SSL/TLS “CCS Injection” vulnerability. To exploit this vulnerability using MITM (Man in the Middle Attack), the attacker will then wait for a new TLS connection which will be followed by Client-Sever ‘Hello’ handshake messages.

Nmap script ssl-ccs-injection -p 5432 192.168.1.12

Nmap-Vulners

Nmap – Vulners is a NSE script using some well-known service to provide info on vulnerabilities. This script completely depends on having information on software versions therefore works with -sV flag.

You can install it using git hub code. Then update the scripts in the NSE database.

git clone https://github.com/vulnersCom/nmap-vulners use/share/nmap/scripts/vulners

nmap --scripts-updatedb

Let us load the scripts and check the service versions available on the target machine using nmap vulners. Here we see that all the scripts are loaded which can be used for vulnerability detection based on a particular service version.

nmap -sV -Pn 192.168.1.12 --script=vulners/vulners.nse

Conclusion

Hence, we see that it using the nmap scripts we can detect the vulnerabilities present on the system which can be a benefit for the Pen Testers.

Author: Jeenali Kothari is a Digital Forensics enthusiast and enjoys technical content writing. You can reach her on Here


文章来源: https://www.hackingarticles.in/nmap-for-pentester-vulnerability-scan/
如有侵权请联系:admin#unsafe.sh