PATH:
usr
/
share
/
nmap
/
scripts
local comm = require "comm" local ldap = require "ldap" local nmap = require "nmap" local shortport = require "shortport" local stdnse = require "stdnse" local string = require "string" local table = require "table" description = [[ Attempts to perform an LDAP search and returns all matches. If no username and password is supplied to the script the Nmap registry is consulted. If the <code>ldap-brute</code> script has been selected and it found a valid account, this account will be used. If not anonymous bind will be used as a last attempt. ]] --- -- @args ldap.username If set, the script will attempt to perform an LDAP bind using the username and password -- @args ldap.password If set, used together with the username to authenticate to the LDAP server -- @args ldap.qfilter If set, specifies a quick filter. The library does not support parsing real LDAP filters. -- The following values are valid for the filter parameter: computer, users, ad_dcs, custom or all. If no value is specified it defaults to all. -- @args ldap.searchattrib When used with the 'custom' qfilter, this parameter works in conjunction with ldap.searchvalue to allow the user to specify a custom attribute and value as search criteria. -- @args ldap.searchvalue When used with the 'custom' qfilter, this parameter works in conjunction with ldap.searchattrib to allow the user to specify a custom attribute and value as search criteria. -- This parameter DOES PERMIT the use of the asterisk '*' as a wildcard. -- @args ldap.base If set, the script will use it as a base for the search. By default the defaultNamingContext is retrieved and used. -- If no defaultNamingContext is available the script iterates over the available namingContexts -- @args ldap.attrib If set, the search will include only the attributes specified. For a single attribute a string value can be used, if -- multiple attributes need to be supplied a table should be used instead. -- @args ldap.maxobjects If set, overrides the number of objects returned by the script (default 20). -- The value -1 removes the limit completely. -- @args ldap.savesearch If set, the script will save the output to a file beginning with the specified path and name. The file suffix -- of .CSV as well as the hostname and port will automatically be added based on the output type selected. -- -- @usage -- nmap -p 389 --script ldap-search --script-args 'ldap.username="cn=ldaptest,cn=users,dc=cqure,dc=net",ldap.password=ldaptest, -- ldap.qfilter=users,ldap.attrib=sAMAccountName' <host> -- -- nmap -p 389 --script ldap-search --script-args 'ldap.username="cn=ldaptest,cn=users,dc=cqure,dc=net",ldap.password=ldaptest, -- ldap.qfilter=custom,ldap.searchattrib="operatingSystem",ldap.searchvalue="Windows *Server*",ldap.attrib={operatingSystem,whencreated,OperatingSystemServicePack}' <host> -- -- @output -- PORT STATE SERVICE REASON -- 389/tcp open ldap syn-ack -- | ldap-search: -- | DC=cqure,DC=net -- | dn: CN=Administrator,CN=Users,DC=cqure,DC=net -- | sAMAccountName: Administrator -- | dn: CN=Guest,CN=Users,DC=cqure,DC=net -- | sAMAccountName: Guest -- | dn: CN=SUPPORT_388945a0,CN=Users,DC=cqure,DC=net -- | sAMAccountName: SUPPORT_388945a0 -- | dn: CN=EDUSRV011,OU=Domain Controllers,DC=cqure,DC=net -- | sAMAccountName: EDUSRV011$ -- | dn: CN=krbtgt,CN=Users,DC=cqure,DC=net -- | sAMAccountName: krbtgt -- | dn: CN=Patrik Karlsson,CN=Users,DC=cqure,DC=net -- | sAMAccountName: patrik -- | dn: CN=VMABUSEXP008,CN=Computers,DC=cqure,DC=net -- | sAMAccountName: VMABUSEXP008$ -- | dn: CN=ldaptest,CN=Users,DC=cqure,DC=net -- |_ sAMAccountName: ldaptest -- -- -- PORT STATE SERVICE REASON -- 389/tcp open ldap syn-ack -- | ldap-search: -- | Context: DC=cqure,DC=net; QFilter: custom; Attributes: operatingSystem,whencreated,OperatingSystemServicePack -- | dn: CN=USDC01,OU=Domain Controllers,DC=cqure,DC=net -- | whenCreated: 2010/08/27 17:30:16 UTC -- | operatingSystem: Windows Server 2008 R2 Datacenter -- | operatingSystemServicePack: Service Pack 1 -- | dn: CN=TESTBOX,OU=Test Servers,DC=cqure,DC=net -- | whenCreated: 2010/09/04 00:33:02 UTC -- | operatingSystem: Windows Server 2008 R2 Standard -- |_ operatingSystemServicePack: Service Pack 1 -- Credit -- ------ -- o Martin Swende who provided me with the initial code that got me started writing this. -- Version 0.8 -- Created 01/12/2010 - v0.1 - created by Patrik Karlsson <patrik@cqure.net> -- Revised 01/20/2010 - v0.2 - added SSL support -- Revised 01/26/2010 - v0.3 - Changed SSL support to comm.tryssl, prefixed arguments with ldap, changes in determination of namingContexts -- Revised 02/17/2010 - v0.4 - Added dependencie to ldap-brute and the abilitity to check for ldap accounts (credentials) stored in nmap registry -- Capped output to 20 entries, use ldap.maxObjects to override -- Revised 07/16/2010 - v0.5 - Fixed bug with empty contexts, added objectClass person to qfilter users, add error msg for invalid credentials -- Revised 09/05/2011 - v0.6 - Added support for saving searches to a file via argument ldap.savesearch -- Revised 10/29/2011 - v0.7 - Added support for custom searches and the ability to leverage LDAP substring search functionality added to LDAP.lua -- Revised 10/30/2011 - v0.8 - Added support for ad_dcs (AD domain controller ) searches and the ability to leverage LDAP extensibleMatch filter added to LDAP.lua author = "Patrik Karlsson" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"discovery", "safe"} dependencies = {"ldap-brute"} portrule = shortport.port_or_service({389,636}, {"ldap","ldapssl"}) function action(host,port) local status local socket, opt local args = nmap.registry.args local username = stdnse.get_script_args('ldap.username') local password = stdnse.get_script_args('ldap.password') local qfilter = stdnse.get_script_args('ldap.qfilter') local searchAttrib = stdnse.get_script_args('ldap.searchattrib') local searchValue = stdnse.get_script_args('ldap.searchvalue') local base = stdnse.get_script_args('ldap.base') local attribs = stdnse.get_script_args('ldap.attrib') local saveFile = stdnse.get_script_args('ldap.savesearch') local accounts local objCount = 0 local maxObjects = stdnse.get_script_args('ldap.maxobjects') and tonumber(stdnse.get_script_args('ldap.maxobjects')) or 20 -- In order to discover what protocol to use (SSL/TCP) we need to send a few bytes to the server -- An anonymous bind should do it local ldap_anonymous_bind = string.char( 0x30, 0x0c, 0x02, 0x01, 0x01, 0x60, 0x07, 0x02, 0x01, 0x03, 0x04, 0x00, 0x80, 0x00 ) local _ socket, _, opt = comm.tryssl( host, port, ldap_anonymous_bind, nil ) if not socket then return end -- Check if ldap-brute stored us some credentials if ( not(username) and nmap.registry.ldapaccounts~=nil ) then accounts = nmap.registry.ldapaccounts end -- We close and re-open the socket so that the anonymous bind does not distract us socket:close() status = socket:connect(host, port, opt) socket:set_timeout(10000) local req local searchResEntries local contexts = {} local result = {} local filter if base == nil then req = { baseObject = "", scope = ldap.SCOPE.base, derefPolicy = ldap.DEREFPOLICY.default, attributes = { "defaultNamingContext", "namingContexts" } } status, searchResEntries = ldap.searchRequest( socket, req ) if not status then socket:close() return end contexts = ldap.extractAttribute( searchResEntries, "defaultNamingContext" ) -- OpenLDAP does not have a defaultNamingContext if not contexts then contexts = ldap.extractAttribute( searchResEntries, "namingContexts" ) end else table.insert(contexts, base) end if ( not(contexts) or #contexts == 0 ) then stdnse.print_debug( "Failed to retrieve namingContexts" ) contexts = {""} end -- perform a bind only if we have valid credentials if ( username ) then local bindParam = { version=3, ['username']=username, ['password']=password} local status, errmsg = ldap.bindRequest( socket, bindParam ) if not status then stdnse.print_debug( string.format("ldap-search failed to bind: %s", errmsg) ) return " \n ERROR: Authentication failed" end -- or if ldap-brute found us something elseif ( accounts ) then for username, password in pairs(accounts) do local bindParam = { version=3, ['username']=username, ['password']=password} local status, errmsg = ldap.bindRequest( socket, bindParam ) if status then break end end end if qfilter == "users" then filter = { op=ldap.FILTER._or, val= { { op=ldap.FILTER.equalityMatch, obj='objectClass', val='user' }, { op=ldap.FILTER.equalityMatch, obj='objectClass', val='posixAccount' }, { op=ldap.FILTER.equalityMatch, obj='objectClass', val='person' } } } elseif qfilter == "computers" or qfilter == "computer" then filter = { op=ldap.FILTER.equalityMatch, obj='objectClass', val='computer' } elseif qfilter == "ad_dcs" then filter = { op=ldap.FILTER.extensibleMatch, obj='userAccountControl', val='1.2.840.113556.1.4.803:=8192' } elseif qfilter == "custom" then if searchAttrib == nil or searchValue == nil then return "\n\nERROR: Please specify both ldap.searchAttrib and ldap.searchValue using using the custom qfilter." end if string.find(searchValue, '*') == nil then filter = { op=ldap.FILTER.equalityMatch, obj=searchAttrib, val=searchValue } else filter = { op=ldap.FILTER.substrings, obj=searchAttrib, val=searchValue } end elseif qfilter == "all" or qfilter == nil then filter = nil -- { op=ldap.FILTER} else return " \n\nERROR: Unsupported Quick Filter: " .. qfilter end if type(attribs) == 'string' then local tmp = attribs attribs = {} table.insert(attribs, tmp) end for _, context in ipairs(contexts) do req = { baseObject = context, scope = ldap.SCOPE.sub, derefPolicy = ldap.DEREFPOLICY.default, filter = filter, attributes = attribs, ['maxObjects'] = maxObjects } status, searchResEntries = ldap.searchRequest( socket, req ) if not status then if ( searchResEntries:match("DSID[-]0C090627") and not(username) ) then return "ERROR: Failed to bind as the anonymous user" else stdnse.print_debug( string.format( "ldap.searchRequest returned: %s", searchResEntries ) ) return end end local result_part = ldap.searchResultToTable( searchResEntries ) if saveFile then local output_file = saveFile .. "_" .. host.ip .. "_" .. port.number .. ".csv" local save_status, save_err = ldap.searchResultToFile(searchResEntries,output_file) if not save_status then stdnse.print_debug(save_err) end end objCount = objCount + (result_part and #result_part or 0) result_part.name = "" if ( context ) then result_part.name = ("Context: %s"):format(#context > 0 and context or "<empty>") end if ( qfilter ) then result_part.name = result_part.name .. ("; QFilter: %s"):format(qfilter) end if ( attribs ) then result_part.name = result_part.name .. ("; Attributes: %s"):format(stdnse.strjoin(",", attribs)) end table.insert( result, result_part ) -- catch any softerrors if searchResEntries.resultCode ~= 0 then local output = stdnse.format_output(true, result ) output = output .. string.format("\n\n\n=========== %s ===========", searchResEntries.errorMessage ) return output end end -- perform a unbind only if we have valid credentials if ( username ) then status = ldap.unbindRequest( socket ) end socket:close() -- if taken a way and ldap returns a single result, it ain't shown.... --result.name = "LDAP Results" local output = stdnse.format_output(true, result ) if ( maxObjects ~= -1 and objCount == maxObjects ) then output = output .. ("\n\nResult limited to %d objects (see ldap.maxobjects)"):format(maxObjects) end return output end
[+]
..
[-] qscan.nse
[edit]
[-] oracle-brute.nse
[edit]
[-] smtp-vuln-cve2011-1764.nse
[edit]
[-] broadcast-pc-duo.nse
[edit]
[-] targets-ipv6-multicast-mld.nse
[edit]
[-] http-backup-finder.nse
[edit]
[-] http-sitemap-generator.nse
[edit]
[-] cassandra-brute.nse
[edit]
[-] snmp-win32-services.nse
[edit]
[-] ftp-brute.nse
[edit]
[-] irc-botnet-channels.nse
[edit]
[-] rsync-brute.nse
[edit]
[-] icap-info.nse
[edit]
[-] citrix-brute-xml.nse
[edit]
[-] iax2-version.nse
[edit]
[-] nfs-ls.nse
[edit]
[-] ndmp-fs-info.nse
[edit]
[-] cvs-brute-repository.nse
[edit]
[-] http-drupal-modules.nse
[edit]
[-] mysql-databases.nse
[edit]
[-] xmpp-info.nse
[edit]
[-] pgsql-brute.nse
[edit]
[-] ssl-google-cert-catalog.nse
[edit]
[-] smtp-commands.nse
[edit]
[-] rpcinfo.nse
[edit]
[-] snmp-hh3c-logins.nse
[edit]
[-] dns-zone-transfer.nse
[edit]
[-] murmur-version.nse
[edit]
[-] metasploit-xmlrpc-brute.nse
[edit]
[-] http-brute.nse
[edit]
[-] nessus-xmlrpc-brute.nse
[edit]
[-] krb5-enum-users.nse
[edit]
[-] vuze-dht-info.nse
[edit]
[-] smb-ls.nse
[edit]
[-] openlookup-info.nse
[edit]
[-] hadoop-namenode-info.nse
[edit]
[-] informix-tables.nse
[edit]
[-] http-vuln-cve2010-0738.nse
[edit]
[-] omp2-brute.nse
[edit]
[-] http-headers.nse
[edit]
[-] bitcoin-info.nse
[edit]
[-] smb-psexec.nse
[edit]
[-] eppc-enum-processes.nse
[edit]
[-] afp-brute.nse
[edit]
[-] iscsi-brute.nse
[edit]
[-] http-enum.nse
[edit]
[-] smb-enum-sessions.nse
[edit]
[-] daytime.nse
[edit]
[-] mongodb-info.nse
[edit]
[-] omp2-enum-targets.nse
[edit]
[-] p2p-conficker.nse
[edit]
[-] teamspeak2-version.nse
[edit]
[-] http-wordpress-brute.nse
[edit]
[-] riak-http-info.nse
[edit]
[-] http-joomla-brute.nse
[edit]
[-] path-mtu.nse
[edit]
[-] targets-traceroute.nse
[edit]
[-] snmp-win32-users.nse
[edit]
[-] http-unsafe-output-escaping.nse
[edit]
[-] http-traceroute.nse
[edit]
[-] ftp-anon.nse
[edit]
[-] mysql-info.nse
[edit]
[-] mtrace.nse
[edit]
[-] openvas-otp-brute.nse
[edit]
[-] lltd-discovery.nse
[edit]
[-] ssl-enum-ciphers.nse
[edit]
[-] dict-info.nse
[edit]
[-] netbus-version.nse
[edit]
[-] nfs-statfs.nse
[edit]
[-] hostmap-bfk.nse
[edit]
[-] dns-random-txid.nse
[edit]
[-] http-affiliate-id.nse
[edit]
[-] socks-brute.nse
[edit]
[-] bitcoin-getaddr.nse
[edit]
[-] acarsd-info.nse
[edit]
[-] http-cakephp-version.nse
[edit]
[-] oracle-enum-users.nse
[edit]
[-] dns-brute.nse
[edit]
[-] http-google-malware.nse
[edit]
[-] hostmap-robtex.nse
[edit]
[-] http-barracuda-dir-traversal.nse
[edit]
[-] http-auth-finder.nse
[edit]
[-] resolveall.nse
[edit]
[-] informix-query.nse
[edit]
[-] mysql-users.nse
[edit]
[-] nrpe-enum.nse
[edit]
[-] mysql-empty-password.nse
[edit]
[-] broadcast-xdmcp-discover.nse
[edit]
[-] ip-geolocation-geobytes.nse
[edit]
[-] cups-info.nse
[edit]
[-] tftp-enum.nse
[edit]
[-] http-icloud-sendmsg.nse
[edit]
[-] nbstat.nse
[edit]
[-] ajp-headers.nse
[edit]
[-] nexpose-brute.nse
[edit]
[-] giop-info.nse
[edit]
[-] sip-call-spoof.nse
[edit]
[-] broadcast-tellstick-discover.nse
[edit]
[-] dns-nsec3-enum.nse
[edit]
[-] http-grep.nse
[edit]
[-] http-drupal-enum-users.nse
[edit]
[-] smb-enum-processes.nse
[edit]
[-] maxdb-info.nse
[edit]
[-] rtsp-url-brute.nse
[edit]
[-] ganglia-info.nse
[edit]
[-] ip-geolocation-maxmind.nse
[edit]
[-] traceroute-geolocation.nse
[edit]
[-] rpcap-info.nse
[edit]
[-] http-waf-detect.nse
[edit]
[-] ms-sql-dac.nse
[edit]
[-] citrix-enum-servers.nse
[edit]
[-] http-vmware-path-vuln.nse
[edit]
[-] mongodb-brute.nse
[edit]
[-] http-passwd.nse
[edit]
[-] x11-access.nse
[edit]
[-] http-generator.nse
[edit]
[-] ms-sql-info.nse
[edit]
[-] http-method-tamper.nse
[edit]
[-] http-robtex-shared-ns.nse
[edit]
[-] http-majordomo2-dir-traversal.nse
[edit]
[-] ms-sql-empty-password.nse
[edit]
[-] broadcast-netbios-master-browser.nse
[edit]
[-] citrix-enum-servers-xml.nse
[edit]
[-] broadcast-networker-discover.nse
[edit]
[-] mrinfo.nse
[edit]
[-] lexmark-config.nse
[edit]
[-] http-frontpage-login.nse
[edit]
[-] smtp-open-relay.nse
[edit]
[-] http-git.nse
[edit]
[-] targets-asn.nse
[edit]
[-] http-favicon.nse
[edit]
[-] backorifice-info.nse
[edit]
[-] http-vuln-cve2011-3192.nse
[edit]
[-] realvnc-auth-bypass.nse
[edit]
[-] broadcast-wpad-discover.nse
[edit]
[-] http-methods.nse
[edit]
[-] smb-check-vulns.nse
[edit]
[-] sshv1.nse
[edit]
[-] broadcast-bjnp-discover.nse
[edit]
[-] http-title.nse
[edit]
[-] broadcast-novell-locate.nse
[edit]
[-] smb-vuln-ms10-054.nse
[edit]
[-] afp-showmount.nse
[edit]
[-] broadcast-rip-discover.nse
[edit]
[-] http-slowloris.nse
[edit]
[-] nat-pmp-mapport.nse
[edit]
[-] ftp-libopie.nse
[edit]
[-] targets-ipv6-multicast-echo.nse
[edit]
[-] nessus-brute.nse
[edit]
[-] membase-brute.nse
[edit]
[-] ip-geolocation-ipinfodb.nse
[edit]
[-] smb-print-text.nse
[edit]
[-] smtp-enum-users.nse
[edit]
[-] ajp-brute.nse
[edit]
[-] bitcoinrpc-info.nse
[edit]
[-] auth-owners.nse
[edit]
[-] targets-ipv6-multicast-invalid-dst.nse
[edit]
[-] afp-path-vuln.nse
[edit]
[-] oracle-brute-stealth.nse
[edit]
[-] http-vlcstreamer-ls.nse
[edit]
[-] auth-spoof.nse
[edit]
[-] nping-brute.nse
[edit]
[-] broadcast-dropbox-listener.nse
[edit]
[-] afp-ls.nse
[edit]
[-] broadcast-db2-discover.nse
[edit]
[-] quake3-info.nse
[edit]
[-] snmp-sysdescr.nse
[edit]
[-] dhcp-discover.nse
[edit]
[-] ms-sql-config.nse
[edit]
[-] http-comments-displayer.nse
[edit]
[-] smb-vuln-ms10-061.nse
[edit]
[-] ipv6-node-info.nse
[edit]
[-] http-awstatstotals-exec.nse
[edit]
[-] ldap-rootdse.nse
[edit]
[-] rtsp-methods.nse
[edit]
[-] smb-enum-domains.nse
[edit]
[-] sniffer-detect.nse
[edit]
[-] hbase-master-info.nse
[edit]
[-] modbus-discover.nse
[edit]
[-] http-rfi-spider.nse
[edit]
[-] msrpc-enum.nse
[edit]
[-] mysql-query.nse
[edit]
[-] ftp-vsftpd-backdoor.nse
[edit]
[-] domcon-brute.nse
[edit]
[-] citrix-enum-apps-xml.nse
[edit]
[-] pjl-ready-message.nse
[edit]
[-] sip-brute.nse
[edit]
[-] http-vuln-cve2011-3368.nse
[edit]
[-] firewalk.nse
[edit]
[-] http-gitweb-projects-enum.nse
[edit]
[-] http-open-redirect.nse
[edit]
[-] ajp-methods.nse
[edit]
[-] ip-forwarding.nse
[edit]
[-] ncp-serverinfo.nse
[edit]
[-] smb-enum-shares.nse
[edit]
[-] ssh2-enum-algos.nse
[edit]
[-] cvs-brute.nse
[edit]
[-] nat-pmp-info.nse
[edit]
[-] epmd-info.nse
[edit]
[-] bjnp-discover.nse
[edit]
[-] stuxnet-detect.nse
[edit]
[-] ftp-vuln-cve2010-4221.nse
[edit]
[-] http-litespeed-sourcecode-download.nse
[edit]
[-] gpsd-info.nse
[edit]
[-] snmp-ios-config.nse
[edit]
[-] broadcast-igmp-discovery.nse
[edit]
[-] http-robtex-reverse-ip.nse
[edit]
[-] snmp-processes.nse
[edit]
[-] broadcast-sybase-asa-discover.nse
[edit]
[-] wsdd-discover.nse
[edit]
[-] netbus-info.nse
[edit]
[-] broadcast-ripng-discover.nse
[edit]
[-] pop3-brute.nse
[edit]
[-] backorifice-brute.nse
[edit]
[-] domcon-cmd.nse
[edit]
[-] citrix-enum-apps.nse
[edit]
[-] dns-nsec-enum.nse
[edit]
[-] rpcap-brute.nse
[edit]
[-] ftp-bounce.nse
[edit]
[-] stun-info.nse
[edit]
[-] dns-update.nse
[edit]
[-] broadcast-wake-on-lan.nse
[edit]
[-] dns-cache-snoop.nse
[edit]
[-] rsync-list-modules.nse
[edit]
[-] snmp-netstat.nse
[edit]
[-] url-snarf.nse
[edit]
[-] snmp-interfaces.nse
[edit]
[-] cassandra-info.nse
[edit]
[-] http-huawei-hg5xx-vuln.nse
[edit]
[-] memcached-info.nse
[edit]
[-] http-proxy-brute.nse
[edit]
[-] pptp-version.nse
[edit]
[-] broadcast-pppoe-discover.nse
[edit]
[-] dns-random-srcport.nse
[edit]
[-] ip-geolocation-geoplugin.nse
[edit]
[-] smb-security-mode.nse
[edit]
[-] ms-sql-dump-hashes.nse
[edit]
[-] ntp-monlist.nse
[edit]
[-] http-wordpress-enum.nse
[edit]
[-] ike-version.nse
[edit]
[-] broadcast-eigrp-discovery.nse
[edit]
[-] amqp-info.nse
[edit]
[-] iax2-brute.nse
[edit]
[-] mysql-variables.nse
[edit]
[-] ajp-request.nse
[edit]
[-] cccam-version.nse
[edit]
[-] mysql-brute.nse
[edit]
[-] http-malware-host.nse
[edit]
[-] http-domino-enum-passwords.nse
[edit]
[-] vnc-brute.nse
[edit]
[-] duplicates.nse
[edit]
[-] db2-das-info.nse
[edit]
[-] broadcast-dhcp6-discover.nse
[edit]
[-] pop3-capabilities.nse
[edit]
[-] http-form-fuzzer.nse
[edit]
[-] flume-master-info.nse
[edit]
[-] ms-sql-tables.nse
[edit]
[-] broadcast-wsdd-discover.nse
[edit]
[-] jdwp-info.nse
[edit]
[-] mcafee-epo-agent.nse
[edit]
[-] smb-brute.nse
[edit]
[-] irc-sasl-brute.nse
[edit]
[-] http-php-version.nse
[edit]
[-] ms-sql-brute.nse
[edit]
[-] http-form-brute.nse
[edit]
[-] http-cors.nse
[edit]
[-] jdwp-version.nse
[edit]
[-] smbv2-enabled.nse
[edit]
[-] ssl-cert.nse
[edit]
[-] dns-fuzz.nse
[edit]
[-] mysql-enum.nse
[edit]
[-] script.db
[edit]
[-] rlogin-brute.nse
[edit]
[-] ovs-agent-version.nse
[edit]
[-] ntp-info.nse
[edit]
[-] ajp-auth.nse
[edit]
[-] targets-sniffer.nse
[edit]
[-] quake3-master-getservers.nse
[edit]
[-] http-date.nse
[edit]
[-] cups-queue-info.nse
[edit]
[-] rdp-vuln-ms12-020.nse
[edit]
[-] http-tplink-dir-traversal.nse
[edit]
[-] http-robots.txt.nse
[edit]
[-] hadoop-tasktracker-info.nse
[edit]
[-] eap-info.nse
[edit]
[-] ms-sql-xp-cmdshell.nse
[edit]
[-] broadcast-dns-service-discovery.nse
[edit]
[-] sip-methods.nse
[edit]
[-] broadcast-avahi-dos.nse
[edit]
[-] hadoop-secondary-namenode-info.nse
[edit]
[-] db2-discover.nse
[edit]
[-] jdwp-inject.nse
[edit]
[-] servicetags.nse
[edit]
[-] netbus-brute.nse
[edit]
[-] ms-sql-hasdbaccess.nse
[edit]
[-] gopher-ls.nse
[edit]
[-] asn-query.nse
[edit]
[-] firewall-bypass.nse
[edit]
[-] redis-brute.nse
[edit]
[-] dpap-brute.nse
[edit]
[-] imap-capabilities.nse
[edit]
[-] smtp-vuln-cve2010-4344.nse
[edit]
[-] tls-nextprotoneg.nse
[edit]
[-] upnp-info.nse
[edit]
[-] http-icloud-findmyiphone.nse
[edit]
[-] ventrilo-info.nse
[edit]
[-] hostmap-ip2hosts.nse
[edit]
[-] wdb-version.nse
[edit]
[-] http-qnap-nas-info.nse
[edit]
[-] smb-enum-groups.nse
[edit]
[-] address-info.nse
[edit]
[-] smb-mbenum.nse
[edit]
[-] dns-srv-enum.nse
[edit]
[-] http-iis-webdav-vuln.nse
[edit]
[-] broadcast-listener.nse
[edit]
[-] http-default-accounts.nse
[edit]
[-] mysql-audit.nse
[edit]
[-] bittorrent-discovery.nse
[edit]
[-] reverse-index.nse
[edit]
[-] smb-os-discovery.nse
[edit]
[-] smtp-strangeport.nse
[edit]
[-] socks-open-proxy.nse
[edit]
[-] http-vhosts.nse
[edit]
[-] broadcast-upnp-info.nse
[edit]
[-] afp-serverinfo.nse
[edit]
[-] targets-ipv6-multicast-slaac.nse
[edit]
[-] ldap-novell-getpass.nse
[edit]
[-] nfs-showmount.nse
[edit]
[-] http-vuln-cve2012-1823.nse
[edit]
[-] stun-version.nse
[edit]
[-] http-fileupload-exploiter.nse
[edit]
[-] vnc-info.nse
[edit]
[-] http-axis2-dir-traversal.nse
[edit]
[-] ssh-hostkey.nse
[edit]
[-] http-phpmyadmin-dir-traversal.nse
[edit]
[-] hadoop-jobtracker-info.nse
[edit]
[-] http-stored-xss.nse
[edit]
[-] hbase-region-info.nse
[edit]
[-] broadcast-ataoe-discover.nse
[edit]
[-] dns-check-zone.nse
[edit]
[-] rdp-enum-encryption.nse
[edit]
[-] ms-sql-query.nse
[edit]
[-] http-wordpress-plugins.nse
[edit]
[-] irc-info.nse
[edit]
[-] rmi-vuln-classloader.nse
[edit]
[-] ssl-known-key.nse
[edit]
[-] mysql-dump-hashes.nse
[edit]
[-] rexec-brute.nse
[edit]
[-] mmouse-exec.nse
[edit]
[-] vmauthd-brute.nse
[edit]
[-] dns-ip6-arpa-scan.nse
[edit]
[-] smb-system-info.nse
[edit]
[-] irc-brute.nse
[edit]
[-] broadcast-versant-locate.nse
[edit]
[-] xmpp-brute.nse
[edit]
[-] ldap-search.nse
[edit]
[-] http-put.nse
[edit]
[-] banner.nse
[edit]
[-] http-adobe-coldfusion-apsa1301.nse
[edit]
[-] llmnr-resolve.nse
[edit]
[-] domino-enum-users.nse
[edit]
[-] broadcast-ms-sql-discover.nse
[edit]
[-] telnet-brute.nse
[edit]
[-] isns-info.nse
[edit]
[-] http-userdir-enum.nse
[edit]
[-] smb-enum-users.nse
[edit]
[-] dns-nsid.nse
[edit]
[-] ndmp-version.nse
[edit]
[-] voldemort-info.nse
[edit]
[-] sslv2.nse
[edit]
[-] redis-info.nse
[edit]
[-] drda-brute.nse
[edit]
[-] smtp-vuln-cve2011-1720.nse
[edit]
[-] skypev2-version.nse
[edit]
[-] http-open-proxy.nse
[edit]
[-] irc-unrealircd-backdoor.nse
[edit]
[-] ssl-date.nse
[edit]
[-] couchdb-databases.nse
[edit]
[-] snmp-win32-software.nse
[edit]
[-] whois.nse
[edit]
[-] http-email-harvest.nse
[edit]
[-] http-virustotal.nse
[edit]
[-] broadcast-pim-discovery.nse
[edit]
[-] distcc-cve2004-2687.nse
[edit]
[-] http-exif-spider.nse
[edit]
[-] couchdb-stats.nse
[edit]
[-] rpc-grind.nse
[edit]
[-] finger.nse
[edit]
[-] metasploit-msgrpc-brute.nse
[edit]
[-] http-waf-fingerprint.nse
[edit]
[-] http-config-backup.nse
[edit]
[-] http-vuln-cve2010-2861.nse
[edit]
[-] ipv6-ra-flood.nse
[edit]
[-] http-phpself-xss.nse
[edit]
[-] http-sql-injection.nse
[edit]
[-] telnet-encryption.nse
[edit]
[-] jdwp-exec.nse
[edit]
[-] hddtemp-info.nse
[edit]
[-] metasploit-info.nse
[edit]
[-] ipidseq.nse
[edit]
[-] http-auth.nse
[edit]
[-] ncp-enum-users.nse
[edit]
[-] sip-enum-users.nse
[edit]
[-] daap-get-library.nse
[edit]
[-] socks-auth-info.nse
[edit]
[-] broadcast-dhcp-discover.nse
[edit]
[-] http-vuln-cve2009-3960.nse
[edit]
[-] http-coldfusion-subzero.nse
[edit]
[-] mongodb-databases.nse
[edit]
[-] xdmcp-discover.nse
[edit]
[-] http-chrono.nse
[edit]
[-] netbus-auth-bypass.nse
[edit]
[-] drda-info.nse
[edit]
[-] membase-http-info.nse
[edit]
[-] smb-flood.nse
[edit]
[-] dns-zeustracker.nse
[edit]
[-] http-apache-negotiation.nse
[edit]
[-] iscsi-info.nse
[edit]
[-] smb-server-stats.nse
[edit]
[-] mysql-vuln-cve2012-2122.nse
[edit]
[-] dns-service-discovery.nse
[edit]
[-] creds-summary.nse
[edit]
[-] oracle-sid-brute.nse
[edit]
[-] dns-recursion.nse
[edit]
[-] broadcast-pc-anywhere.nse
[edit]
[-] http-slowloris-check.nse
[edit]
[-] snmp-brute.nse
[edit]
[-] ftp-proftpd-backdoor.nse
[edit]
[-] imap-brute.nse
[edit]
[-] gkrellm-info.nse
[edit]
[-] versant-info.nse
[edit]
[-] svn-brute.nse
[edit]
[-] hadoop-datanode-info.nse
[edit]
[-] informix-brute.nse
[edit]
[-] mmouse-brute.nse
[edit]
[-] samba-vuln-cve-2012-1182.nse
[edit]
[-] broadcast-ping.nse
[edit]
[-] unusual-port.nse
[edit]
[-] smtp-brute.nse
[edit]
[-] http-vuln-cve2013-0156.nse
[edit]
[-] http-trace.nse
[edit]
[-] rmi-dumpregistry.nse
[edit]
[-] dns-blacklist.nse
[edit]
[-] ldap-brute.nse
[edit]
[-] pcanywhere-brute.nse
[edit]
[-] dns-client-subnet-scan.nse
[edit]
[-] snmp-win32-shares.nse
[edit]