PATH:
usr
/
share
/
nmap
/
scripts
local asn1 = require "asn1" local bin = require "bin" local coroutine = require "coroutine" local nmap = require "nmap" local os = require "os" local shortport = require "shortport" local stdnse = require "stdnse" local table = require "table" local unpwdb = require "unpwdb" description = [[ Discovers valid usernames by brute force querying likely usernames against a Kerberos service. When an invalid username is requested the server will responde using the Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN, allowing us to determine that the user name was invalid. Valid user names will illicit either the TGT in a AS-REP response or the error KRB5KDC_ERR_PREAUTH_REQUIRED, signaling that the user is required to perform pre authentication. The script should work against Active Directory and ? It needs a valid Kerberos REALM in order to operate. ]] --- -- @usage -- nmap -p 88 --script krb5-enum-users --script-args krb5-enum-users.realm='test' -- -- @output -- PORT STATE SERVICE REASON -- 88/tcp open kerberos-sec syn-ack -- | krb5-enum-users: -- | Discovered Kerberos principals -- | administrator@test -- | mysql@test -- |_ tomcat@test -- -- @args krb5-enum-users.realm this argument is required as it supplies the -- script with the Kerberos REALM against which to guess the user names. -- -- -- -- Version 0.1 -- Created 10/16/2011 - v0.1 - created by Patrik Karlsson <patrik@cqure.net> -- author = "Patrik Karlsson" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"auth", "intrusive"} portrule = shortport.port_or_service( 88, {"kerberos-sec"}, {"udp","tcp"}, {"open", "open|filtered"} ) -- This an embryo of a Kerberos 5 packet creation and parsing class. It's very -- tiny class and holds only the necessary functions to support this script. -- This class be factored out into it's own library, once more scripts make use -- of it. KRB5 = { -- Valid Kerberos message types MessageType = { ['AS-REQ'] = 10, ['AS-REP'] = 11, ['KRB-ERROR'] = 30, }, -- Some of the used error messages ErrorMessages = { ['KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN'] = 6, ['KRB5KDC_ERR_PREAUTH_REQUIRED'] = 25, ['KDC_ERR_WRONG_REALM'] = 68, }, -- A list of some ot the encryption types EncryptionTypes = { { ['aes256-cts-hmac-sha1-96'] = 18 }, { ['aes128-cts-hmac-sha1-96'] = 17 }, { ['des3-cbc-sha1'] = 16 }, { ['rc4-hmac'] = 23 }, -- { ['des-cbc-crc'] = 1 }, -- { ['des-cbc-md5'] = 3 }, -- { ['des-cbc-md4'] = 2 } }, -- A list of principal name types NameTypes = { ['NT-PRINCIPAL'] = 1, ['NT-SRV-INST'] = 2, }, -- Creates a new Krb5 instance -- @return o as the new instance new = function(self) local o = {} setmetatable(o, self) self.__index = self return o end, -- A number of custom ASN1 decoders needed to decode the response tagDecoder = { ["18"] = function( self, encStr, elen, pos ) return bin.unpack("A" .. elen, encStr, pos) end, ["1B"] = function( ... ) return KRB5.tagDecoder["18"](...) end, ["6B"] = function( self, encStr, elen, pos ) local seq pos, seq = self:decodeSeq(encStr, elen, pos) return pos, seq end, -- Not really sure what these are, but they all decode sequences ["7E"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A0"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A1"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A2"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A3"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A4"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A5"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A6"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A7"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A8"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["A9"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["AA"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, ["AC"] = function( ... ) return KRB5.tagDecoder["6B"](...) end, }, -- A few Kerberos ASN1 encoders tagEncoder = { ['table'] = function(self, val) local types = { ['GeneralizedTime'] = 0x18, ['GeneralString'] = 0x1B, } local len = asn1.ASN1Encoder.encodeLength(#val[1]) if ( val._type and types[val._type] ) then return bin.pack("CAA", types[val._type], len, val[1]) elseif ( val._type and 'number' == type(val._type) ) then return bin.pack("CAA", val._type, len, val[1]) end end, }, -- Encodes a sequence using a custom type -- @param encoder class containing an instance of a ASN1Encoder -- @param seqtype number the sequence type to encode -- @param seq string containing the sequence to encode encodeSequence = function(self, encoder, seqtype, seq) return encoder:encode( { _type = seqtype, seq } ) end, -- Encodes a Kerberos Principal -- @param encoder class containing an instance of ASN1Encoder -- @param name_type number containing a valid Kerberos name type -- @param names table containing a list of names to encode -- @return princ string containing an encoded principal encodePrincipal = function(self, encoder, name_type, names ) local princ = "" for _, n in ipairs(names) do princ = princ .. encoder:encode( { _type = 'GeneralString', n } ) end princ = self:encodeSequence(encoder, 0x30, princ) princ = self:encodeSequence(encoder, 0xa1, princ) princ = encoder:encode( name_type ) .. princ -- not sure about how this works, but apparently it does princ = bin.pack("H", "A003") .. princ princ = self:encodeSequence(encoder,0x30, princ) return princ end, -- Encodes the Kerberos AS-REQ request -- @param realm string containing the Kerberos REALM -- @param user string containing the Kerberos principal name -- @param protocol string containing either of "tcp" or "udp" -- @return data string containing the encoded request encodeASREQ = function(self, realm, user, protocol) assert(protocol == "tcp" or protocol == "udp", "Protocol has to be either \"tcp\" or \"udp\"") local encoder = asn1.ASN1Encoder:new() encoder:registerTagEncoders(KRB5.tagEncoder) local data = "" -- encode encryption types for _,enctype in ipairs(KRB5.EncryptionTypes) do for k, v in pairs( enctype ) do data = data .. encoder:encode(v) end end data = self:encodeSequence(encoder, 0x30, data ) data = self:encodeSequence(encoder, 0xA8, data ) -- encode nonce local nonce = 155874945 data = self:encodeSequence(encoder, 0xA7, encoder:encode(nonce) ) .. data -- encode from/to local fromdate = os.time() + 10 * 60 * 60 local from = os.date("%Y%m%d%H%M%SZ", fromdate) data = self:encodeSequence(encoder, 0xA5, encoder:encode( { from, _type='GeneralizedTime' })) .. data local names = { "krbtgt", realm } local sname = self:encodePrincipal( encoder, KRB5.NameTypes['NT-SRV-INST'], names ) sname = self:encodeSequence(encoder, 0xA3, sname) data = sname .. data -- realm data = self:encodeSequence(encoder, 0xA2, encoder:encode( { _type = 'GeneralString', realm })) .. data local cname = self:encodePrincipal(encoder, KRB5.NameTypes['NT-PRINCIPAL'], { user }) cname = self:encodeSequence(encoder, 0xA1, cname) data = cname .. data -- forwardable local kdc_options = 0x40000000 data = bin.pack(">I", kdc_options) .. data -- add padding data = bin.pack("C", 0) .. data -- hmm, wonder what this is data = bin.pack("H", "A0070305") .. data data = self:encodeSequence(encoder, 0x30, data) data = self:encodeSequence(encoder, 0xA4, data) data = self:encodeSequence(encoder, 0xA2, encoder:encode(KRB5.MessageType['AS-REQ'])) .. data local pvno = 5 data = self:encodeSequence(encoder, 0xA1, encoder:encode(pvno) ) .. data data = self:encodeSequence(encoder, 0x30, data) data = self:encodeSequence(encoder, 0x6a, data) if ( protocol == "tcp" ) then data = bin.pack(">I", #data) .. data end return data end, -- Parses the result from the AS-REQ -- @param data string containing the raw unparsed data -- @return status boolean true on success, false on failure -- @return msg table containing the fields <code>type</code> and -- <code>error_code</code> if the type is an error. parseResult = function(self, data) local decoder = asn1.ASN1Decoder:new() decoder:registerTagDecoders(KRB5.tagDecoder) decoder:setStopOnError(true) local pos, result = decoder:decode(data) local msg = {} if ( #result == 0 or #result[1] < 2 or #result[1][2] < 1 ) then return false, nil end msg.type = result[1][2][1] if ( msg.type == KRB5.MessageType['KRB-ERROR'] ) then if ( #result[1] < 5 and #result[1][5] < 1 ) then return false, nil end msg.error_code = result[1][5][1] return true, msg elseif ( msg.type == KRB5.MessageType['AS-REP'] ) then return true, msg end return false, nil end, } -- Checks whether the user exists or not -- @param host table as received by the action method -- @param port table as received by the action method -- @param realm string containing the Kerberos REALM -- @param user string containing the Kerberos principal -- @return status boolean, true on success, false on failure -- @return state VALID or INVALID or error message if status was false local function checkUser( host, port, realm, user ) local krb5 = KRB5:new() local data = krb5:encodeASREQ(realm, user, port.protocol) local socket = nmap.new_socket() local status = socket:connect(host, port) if ( not(status) ) then return false, "ERROR: Failed to connect to Kerberos service" end socket:send(data) status, data = socket:receive() if ( port.protocol == 'tcp' ) then data = data:sub(5) end if ( not(status) ) then return false, "ERROR: Failed to receive result from Kerberos service" end socket:close() local msg status, msg = krb5:parseResult(data) if ( not(status) ) then return false, "ERROR: Failed to parse the result returned from the Kerberos service" end if ( msg and msg.error_code ) then if ( msg.error_code == KRB5.ErrorMessages['KRB5KDC_ERR_PREAUTH_REQUIRED'] ) then return true, "VALID" elseif ( msg.error_code == KRB5.ErrorMessages['KDC_ERR_WRONG_REALM'] ) then return false, "Invalid Kerberos REALM" end elseif ( msg.type == KRB5.MessageType['AS-REP'] ) then return true, "VALID" end return true, "INVALID" end -- Checks whether the Kerberos REALM exists or not -- @param host table as received by the action method -- @param port table as received by the action method -- @param realm string containing the Kerberos REALM -- @return status boolean, true on success, false on failure local function isValidRealm( host, port, realm ) return checkUser( host, port, realm, "nmap") end -- Wraps the checkUser function so that it is suitable to be called from -- a thread. Adds a user to the result table in case it's valid. -- @param host table as received by the action method -- @param port table as received by the action method -- @param realm string containing the Kerberos REALM -- @param user string containing the Kerberos principal -- @param result table to which all discovered users are added local function checkUserThread( host, port, realm, user, result ) local condvar = nmap.condvar(result) local status, state = checkUser(host, port, realm, user) if ( status and state == "VALID" ) then table.insert(result, ("%s@%s"):format(user,realm)) end condvar "signal" end action = function( host, port ) local realm = stdnse.get_script_args("krb5-enum-users.realm") local result = {} local condvar = nmap.condvar(result) -- did the user supply a realm if ( not(realm) ) then return "ERROR: No Kerberos REALM was supplied, aborting ..." end -- does the realm appear to exist if ( not(isValidRealm(host, port, realm)) ) then return "ERROR: Invalid Kerberos REALM, aborting ..." end -- load our user database from unpwdb local status, usernames = unpwdb.usernames() if( not(status) ) then return "ERROR: Failed to load unpwdb usernames" end -- start as many threads as there are names in the list local threads = {} for user in usernames do local co = stdnse.new_thread( checkUserThread, host, port, realm, user, result ) threads[co] = true end -- wait for all threads to finish up repeat for t in pairs(threads) do if ( coroutine.status(t) == "dead" ) then threads[t] = nil end end if ( next(threads) ) then condvar "wait" end until( next(threads) == nil ) if ( #result > 0 ) then result = { name = "Discovered Kerberos principals", result } end return stdnse.format_output(true, result) end
[+]
..
[-] qscan.nse
[edit]
[-] oracle-brute.nse
[edit]
[-] smtp-vuln-cve2011-1764.nse
[edit]
[-] broadcast-pc-duo.nse
[edit]
[-] targets-ipv6-multicast-mld.nse
[edit]
[-] http-backup-finder.nse
[edit]
[-] http-sitemap-generator.nse
[edit]
[-] cassandra-brute.nse
[edit]
[-] snmp-win32-services.nse
[edit]
[-] ftp-brute.nse
[edit]
[-] irc-botnet-channels.nse
[edit]
[-] rsync-brute.nse
[edit]
[-] icap-info.nse
[edit]
[-] citrix-brute-xml.nse
[edit]
[-] iax2-version.nse
[edit]
[-] nfs-ls.nse
[edit]
[-] ndmp-fs-info.nse
[edit]
[-] cvs-brute-repository.nse
[edit]
[-] http-drupal-modules.nse
[edit]
[-] mysql-databases.nse
[edit]
[-] xmpp-info.nse
[edit]
[-] pgsql-brute.nse
[edit]
[-] ssl-google-cert-catalog.nse
[edit]
[-] smtp-commands.nse
[edit]
[-] rpcinfo.nse
[edit]
[-] snmp-hh3c-logins.nse
[edit]
[-] dns-zone-transfer.nse
[edit]
[-] murmur-version.nse
[edit]
[-] metasploit-xmlrpc-brute.nse
[edit]
[-] http-brute.nse
[edit]
[-] nessus-xmlrpc-brute.nse
[edit]
[-] krb5-enum-users.nse
[edit]
[-] vuze-dht-info.nse
[edit]
[-] smb-ls.nse
[edit]
[-] openlookup-info.nse
[edit]
[-] hadoop-namenode-info.nse
[edit]
[-] informix-tables.nse
[edit]
[-] http-vuln-cve2010-0738.nse
[edit]
[-] omp2-brute.nse
[edit]
[-] http-headers.nse
[edit]
[-] bitcoin-info.nse
[edit]
[-] smb-psexec.nse
[edit]
[-] eppc-enum-processes.nse
[edit]
[-] afp-brute.nse
[edit]
[-] iscsi-brute.nse
[edit]
[-] http-enum.nse
[edit]
[-] smb-enum-sessions.nse
[edit]
[-] daytime.nse
[edit]
[-] mongodb-info.nse
[edit]
[-] omp2-enum-targets.nse
[edit]
[-] p2p-conficker.nse
[edit]
[-] teamspeak2-version.nse
[edit]
[-] http-wordpress-brute.nse
[edit]
[-] riak-http-info.nse
[edit]
[-] http-joomla-brute.nse
[edit]
[-] path-mtu.nse
[edit]
[-] targets-traceroute.nse
[edit]
[-] snmp-win32-users.nse
[edit]
[-] http-unsafe-output-escaping.nse
[edit]
[-] http-traceroute.nse
[edit]
[-] ftp-anon.nse
[edit]
[-] mysql-info.nse
[edit]
[-] mtrace.nse
[edit]
[-] openvas-otp-brute.nse
[edit]
[-] lltd-discovery.nse
[edit]
[-] ssl-enum-ciphers.nse
[edit]
[-] dict-info.nse
[edit]
[-] netbus-version.nse
[edit]
[-] nfs-statfs.nse
[edit]
[-] hostmap-bfk.nse
[edit]
[-] dns-random-txid.nse
[edit]
[-] http-affiliate-id.nse
[edit]
[-] socks-brute.nse
[edit]
[-] bitcoin-getaddr.nse
[edit]
[-] acarsd-info.nse
[edit]
[-] http-cakephp-version.nse
[edit]
[-] oracle-enum-users.nse
[edit]
[-] dns-brute.nse
[edit]
[-] http-google-malware.nse
[edit]
[-] hostmap-robtex.nse
[edit]
[-] http-barracuda-dir-traversal.nse
[edit]
[-] http-auth-finder.nse
[edit]
[-] resolveall.nse
[edit]
[-] informix-query.nse
[edit]
[-] mysql-users.nse
[edit]
[-] nrpe-enum.nse
[edit]
[-] mysql-empty-password.nse
[edit]
[-] broadcast-xdmcp-discover.nse
[edit]
[-] ip-geolocation-geobytes.nse
[edit]
[-] cups-info.nse
[edit]
[-] tftp-enum.nse
[edit]
[-] http-icloud-sendmsg.nse
[edit]
[-] nbstat.nse
[edit]
[-] ajp-headers.nse
[edit]
[-] nexpose-brute.nse
[edit]
[-] giop-info.nse
[edit]
[-] sip-call-spoof.nse
[edit]
[-] broadcast-tellstick-discover.nse
[edit]
[-] dns-nsec3-enum.nse
[edit]
[-] http-grep.nse
[edit]
[-] http-drupal-enum-users.nse
[edit]
[-] smb-enum-processes.nse
[edit]
[-] maxdb-info.nse
[edit]
[-] rtsp-url-brute.nse
[edit]
[-] ganglia-info.nse
[edit]
[-] ip-geolocation-maxmind.nse
[edit]
[-] traceroute-geolocation.nse
[edit]
[-] rpcap-info.nse
[edit]
[-] http-waf-detect.nse
[edit]
[-] ms-sql-dac.nse
[edit]
[-] citrix-enum-servers.nse
[edit]
[-] http-vmware-path-vuln.nse
[edit]
[-] mongodb-brute.nse
[edit]
[-] http-passwd.nse
[edit]
[-] x11-access.nse
[edit]
[-] http-generator.nse
[edit]
[-] ms-sql-info.nse
[edit]
[-] http-method-tamper.nse
[edit]
[-] http-robtex-shared-ns.nse
[edit]
[-] http-majordomo2-dir-traversal.nse
[edit]
[-] ms-sql-empty-password.nse
[edit]
[-] broadcast-netbios-master-browser.nse
[edit]
[-] citrix-enum-servers-xml.nse
[edit]
[-] broadcast-networker-discover.nse
[edit]
[-] mrinfo.nse
[edit]
[-] lexmark-config.nse
[edit]
[-] http-frontpage-login.nse
[edit]
[-] smtp-open-relay.nse
[edit]
[-] http-git.nse
[edit]
[-] targets-asn.nse
[edit]
[-] http-favicon.nse
[edit]
[-] backorifice-info.nse
[edit]
[-] http-vuln-cve2011-3192.nse
[edit]
[-] realvnc-auth-bypass.nse
[edit]
[-] broadcast-wpad-discover.nse
[edit]
[-] http-methods.nse
[edit]
[-] smb-check-vulns.nse
[edit]
[-] sshv1.nse
[edit]
[-] broadcast-bjnp-discover.nse
[edit]
[-] http-title.nse
[edit]
[-] broadcast-novell-locate.nse
[edit]
[-] smb-vuln-ms10-054.nse
[edit]
[-] afp-showmount.nse
[edit]
[-] broadcast-rip-discover.nse
[edit]
[-] http-slowloris.nse
[edit]
[-] nat-pmp-mapport.nse
[edit]
[-] ftp-libopie.nse
[edit]
[-] targets-ipv6-multicast-echo.nse
[edit]
[-] nessus-brute.nse
[edit]
[-] membase-brute.nse
[edit]
[-] ip-geolocation-ipinfodb.nse
[edit]
[-] smb-print-text.nse
[edit]
[-] smtp-enum-users.nse
[edit]
[-] ajp-brute.nse
[edit]
[-] bitcoinrpc-info.nse
[edit]
[-] auth-owners.nse
[edit]
[-] targets-ipv6-multicast-invalid-dst.nse
[edit]
[-] afp-path-vuln.nse
[edit]
[-] oracle-brute-stealth.nse
[edit]
[-] http-vlcstreamer-ls.nse
[edit]
[-] auth-spoof.nse
[edit]
[-] nping-brute.nse
[edit]
[-] broadcast-dropbox-listener.nse
[edit]
[-] afp-ls.nse
[edit]
[-] broadcast-db2-discover.nse
[edit]
[-] quake3-info.nse
[edit]
[-] snmp-sysdescr.nse
[edit]
[-] dhcp-discover.nse
[edit]
[-] ms-sql-config.nse
[edit]
[-] http-comments-displayer.nse
[edit]
[-] smb-vuln-ms10-061.nse
[edit]
[-] ipv6-node-info.nse
[edit]
[-] http-awstatstotals-exec.nse
[edit]
[-] ldap-rootdse.nse
[edit]
[-] rtsp-methods.nse
[edit]
[-] smb-enum-domains.nse
[edit]
[-] sniffer-detect.nse
[edit]
[-] hbase-master-info.nse
[edit]
[-] modbus-discover.nse
[edit]
[-] http-rfi-spider.nse
[edit]
[-] msrpc-enum.nse
[edit]
[-] mysql-query.nse
[edit]
[-] ftp-vsftpd-backdoor.nse
[edit]
[-] domcon-brute.nse
[edit]
[-] citrix-enum-apps-xml.nse
[edit]
[-] pjl-ready-message.nse
[edit]
[-] sip-brute.nse
[edit]
[-] http-vuln-cve2011-3368.nse
[edit]
[-] firewalk.nse
[edit]
[-] http-gitweb-projects-enum.nse
[edit]
[-] http-open-redirect.nse
[edit]
[-] ajp-methods.nse
[edit]
[-] ip-forwarding.nse
[edit]
[-] ncp-serverinfo.nse
[edit]
[-] smb-enum-shares.nse
[edit]
[-] ssh2-enum-algos.nse
[edit]
[-] cvs-brute.nse
[edit]
[-] nat-pmp-info.nse
[edit]
[-] epmd-info.nse
[edit]
[-] bjnp-discover.nse
[edit]
[-] stuxnet-detect.nse
[edit]
[-] ftp-vuln-cve2010-4221.nse
[edit]
[-] http-litespeed-sourcecode-download.nse
[edit]
[-] gpsd-info.nse
[edit]
[-] snmp-ios-config.nse
[edit]
[-] broadcast-igmp-discovery.nse
[edit]
[-] http-robtex-reverse-ip.nse
[edit]
[-] snmp-processes.nse
[edit]
[-] broadcast-sybase-asa-discover.nse
[edit]
[-] wsdd-discover.nse
[edit]
[-] netbus-info.nse
[edit]
[-] broadcast-ripng-discover.nse
[edit]
[-] pop3-brute.nse
[edit]
[-] backorifice-brute.nse
[edit]
[-] domcon-cmd.nse
[edit]
[-] citrix-enum-apps.nse
[edit]
[-] dns-nsec-enum.nse
[edit]
[-] rpcap-brute.nse
[edit]
[-] ftp-bounce.nse
[edit]
[-] stun-info.nse
[edit]
[-] dns-update.nse
[edit]
[-] broadcast-wake-on-lan.nse
[edit]
[-] dns-cache-snoop.nse
[edit]
[-] rsync-list-modules.nse
[edit]
[-] snmp-netstat.nse
[edit]
[-] url-snarf.nse
[edit]
[-] snmp-interfaces.nse
[edit]
[-] cassandra-info.nse
[edit]
[-] http-huawei-hg5xx-vuln.nse
[edit]
[-] memcached-info.nse
[edit]
[-] http-proxy-brute.nse
[edit]
[-] pptp-version.nse
[edit]
[-] broadcast-pppoe-discover.nse
[edit]
[-] dns-random-srcport.nse
[edit]
[-] ip-geolocation-geoplugin.nse
[edit]
[-] smb-security-mode.nse
[edit]
[-] ms-sql-dump-hashes.nse
[edit]
[-] ntp-monlist.nse
[edit]
[-] http-wordpress-enum.nse
[edit]
[-] ike-version.nse
[edit]
[-] broadcast-eigrp-discovery.nse
[edit]
[-] amqp-info.nse
[edit]
[-] iax2-brute.nse
[edit]
[-] mysql-variables.nse
[edit]
[-] ajp-request.nse
[edit]
[-] cccam-version.nse
[edit]
[-] mysql-brute.nse
[edit]
[-] http-malware-host.nse
[edit]
[-] http-domino-enum-passwords.nse
[edit]
[-] vnc-brute.nse
[edit]
[-] duplicates.nse
[edit]
[-] db2-das-info.nse
[edit]
[-] broadcast-dhcp6-discover.nse
[edit]
[-] pop3-capabilities.nse
[edit]
[-] http-form-fuzzer.nse
[edit]
[-] flume-master-info.nse
[edit]
[-] ms-sql-tables.nse
[edit]
[-] broadcast-wsdd-discover.nse
[edit]
[-] jdwp-info.nse
[edit]
[-] mcafee-epo-agent.nse
[edit]
[-] smb-brute.nse
[edit]
[-] irc-sasl-brute.nse
[edit]
[-] http-php-version.nse
[edit]
[-] ms-sql-brute.nse
[edit]
[-] http-form-brute.nse
[edit]
[-] http-cors.nse
[edit]
[-] jdwp-version.nse
[edit]
[-] smbv2-enabled.nse
[edit]
[-] ssl-cert.nse
[edit]
[-] dns-fuzz.nse
[edit]
[-] mysql-enum.nse
[edit]
[-] script.db
[edit]
[-] rlogin-brute.nse
[edit]
[-] ovs-agent-version.nse
[edit]
[-] ntp-info.nse
[edit]
[-] ajp-auth.nse
[edit]
[-] targets-sniffer.nse
[edit]
[-] quake3-master-getservers.nse
[edit]
[-] http-date.nse
[edit]
[-] cups-queue-info.nse
[edit]
[-] rdp-vuln-ms12-020.nse
[edit]
[-] http-tplink-dir-traversal.nse
[edit]
[-] http-robots.txt.nse
[edit]
[-] hadoop-tasktracker-info.nse
[edit]
[-] eap-info.nse
[edit]
[-] ms-sql-xp-cmdshell.nse
[edit]
[-] broadcast-dns-service-discovery.nse
[edit]
[-] sip-methods.nse
[edit]
[-] broadcast-avahi-dos.nse
[edit]
[-] hadoop-secondary-namenode-info.nse
[edit]
[-] db2-discover.nse
[edit]
[-] jdwp-inject.nse
[edit]
[-] servicetags.nse
[edit]
[-] netbus-brute.nse
[edit]
[-] ms-sql-hasdbaccess.nse
[edit]
[-] gopher-ls.nse
[edit]
[-] asn-query.nse
[edit]
[-] firewall-bypass.nse
[edit]
[-] redis-brute.nse
[edit]
[-] dpap-brute.nse
[edit]
[-] imap-capabilities.nse
[edit]
[-] smtp-vuln-cve2010-4344.nse
[edit]
[-] tls-nextprotoneg.nse
[edit]
[-] upnp-info.nse
[edit]
[-] http-icloud-findmyiphone.nse
[edit]
[-] ventrilo-info.nse
[edit]
[-] hostmap-ip2hosts.nse
[edit]
[-] wdb-version.nse
[edit]
[-] http-qnap-nas-info.nse
[edit]
[-] smb-enum-groups.nse
[edit]
[-] address-info.nse
[edit]
[-] smb-mbenum.nse
[edit]
[-] dns-srv-enum.nse
[edit]
[-] http-iis-webdav-vuln.nse
[edit]
[-] broadcast-listener.nse
[edit]
[-] http-default-accounts.nse
[edit]
[-] mysql-audit.nse
[edit]
[-] bittorrent-discovery.nse
[edit]
[-] reverse-index.nse
[edit]
[-] smb-os-discovery.nse
[edit]
[-] smtp-strangeport.nse
[edit]
[-] socks-open-proxy.nse
[edit]
[-] http-vhosts.nse
[edit]
[-] broadcast-upnp-info.nse
[edit]
[-] afp-serverinfo.nse
[edit]
[-] targets-ipv6-multicast-slaac.nse
[edit]
[-] ldap-novell-getpass.nse
[edit]
[-] nfs-showmount.nse
[edit]
[-] http-vuln-cve2012-1823.nse
[edit]
[-] stun-version.nse
[edit]
[-] http-fileupload-exploiter.nse
[edit]
[-] vnc-info.nse
[edit]
[-] http-axis2-dir-traversal.nse
[edit]
[-] ssh-hostkey.nse
[edit]
[-] http-phpmyadmin-dir-traversal.nse
[edit]
[-] hadoop-jobtracker-info.nse
[edit]
[-] http-stored-xss.nse
[edit]
[-] hbase-region-info.nse
[edit]
[-] broadcast-ataoe-discover.nse
[edit]
[-] dns-check-zone.nse
[edit]
[-] rdp-enum-encryption.nse
[edit]
[-] ms-sql-query.nse
[edit]
[-] http-wordpress-plugins.nse
[edit]
[-] irc-info.nse
[edit]
[-] rmi-vuln-classloader.nse
[edit]
[-] ssl-known-key.nse
[edit]
[-] mysql-dump-hashes.nse
[edit]
[-] rexec-brute.nse
[edit]
[-] mmouse-exec.nse
[edit]
[-] vmauthd-brute.nse
[edit]
[-] dns-ip6-arpa-scan.nse
[edit]
[-] smb-system-info.nse
[edit]
[-] irc-brute.nse
[edit]
[-] broadcast-versant-locate.nse
[edit]
[-] xmpp-brute.nse
[edit]
[-] ldap-search.nse
[edit]
[-] http-put.nse
[edit]
[-] banner.nse
[edit]
[-] http-adobe-coldfusion-apsa1301.nse
[edit]
[-] llmnr-resolve.nse
[edit]
[-] domino-enum-users.nse
[edit]
[-] broadcast-ms-sql-discover.nse
[edit]
[-] telnet-brute.nse
[edit]
[-] isns-info.nse
[edit]
[-] http-userdir-enum.nse
[edit]
[-] smb-enum-users.nse
[edit]
[-] dns-nsid.nse
[edit]
[-] ndmp-version.nse
[edit]
[-] voldemort-info.nse
[edit]
[-] sslv2.nse
[edit]
[-] redis-info.nse
[edit]
[-] drda-brute.nse
[edit]
[-] smtp-vuln-cve2011-1720.nse
[edit]
[-] skypev2-version.nse
[edit]
[-] http-open-proxy.nse
[edit]
[-] irc-unrealircd-backdoor.nse
[edit]
[-] ssl-date.nse
[edit]
[-] couchdb-databases.nse
[edit]
[-] snmp-win32-software.nse
[edit]
[-] whois.nse
[edit]
[-] http-email-harvest.nse
[edit]
[-] http-virustotal.nse
[edit]
[-] broadcast-pim-discovery.nse
[edit]
[-] distcc-cve2004-2687.nse
[edit]
[-] http-exif-spider.nse
[edit]
[-] couchdb-stats.nse
[edit]
[-] rpc-grind.nse
[edit]
[-] finger.nse
[edit]
[-] metasploit-msgrpc-brute.nse
[edit]
[-] http-waf-fingerprint.nse
[edit]
[-] http-config-backup.nse
[edit]
[-] http-vuln-cve2010-2861.nse
[edit]
[-] ipv6-ra-flood.nse
[edit]
[-] http-phpself-xss.nse
[edit]
[-] http-sql-injection.nse
[edit]
[-] telnet-encryption.nse
[edit]
[-] jdwp-exec.nse
[edit]
[-] hddtemp-info.nse
[edit]
[-] metasploit-info.nse
[edit]
[-] ipidseq.nse
[edit]
[-] http-auth.nse
[edit]
[-] ncp-enum-users.nse
[edit]
[-] sip-enum-users.nse
[edit]
[-] daap-get-library.nse
[edit]
[-] socks-auth-info.nse
[edit]
[-] broadcast-dhcp-discover.nse
[edit]
[-] http-vuln-cve2009-3960.nse
[edit]
[-] http-coldfusion-subzero.nse
[edit]
[-] mongodb-databases.nse
[edit]
[-] xdmcp-discover.nse
[edit]
[-] http-chrono.nse
[edit]
[-] netbus-auth-bypass.nse
[edit]
[-] drda-info.nse
[edit]
[-] membase-http-info.nse
[edit]
[-] smb-flood.nse
[edit]
[-] dns-zeustracker.nse
[edit]
[-] http-apache-negotiation.nse
[edit]
[-] iscsi-info.nse
[edit]
[-] smb-server-stats.nse
[edit]
[-] mysql-vuln-cve2012-2122.nse
[edit]
[-] dns-service-discovery.nse
[edit]
[-] creds-summary.nse
[edit]
[-] oracle-sid-brute.nse
[edit]
[-] dns-recursion.nse
[edit]
[-] broadcast-pc-anywhere.nse
[edit]
[-] http-slowloris-check.nse
[edit]
[-] snmp-brute.nse
[edit]
[-] ftp-proftpd-backdoor.nse
[edit]
[-] imap-brute.nse
[edit]
[-] gkrellm-info.nse
[edit]
[-] versant-info.nse
[edit]
[-] svn-brute.nse
[edit]
[-] hadoop-datanode-info.nse
[edit]
[-] informix-brute.nse
[edit]
[-] mmouse-brute.nse
[edit]
[-] samba-vuln-cve-2012-1182.nse
[edit]
[-] broadcast-ping.nse
[edit]
[-] unusual-port.nse
[edit]
[-] smtp-brute.nse
[edit]
[-] http-vuln-cve2013-0156.nse
[edit]
[-] http-trace.nse
[edit]
[-] rmi-dumpregistry.nse
[edit]
[-] dns-blacklist.nse
[edit]
[-] ldap-brute.nse
[edit]
[-] pcanywhere-brute.nse
[edit]
[-] dns-client-subnet-scan.nse
[edit]
[-] snmp-win32-shares.nse
[edit]