Breaking News

Mastering Nmap Scripting Engine in Kali Linux

Penetration Testing: Phase 2- Scanning: Part 5:

Nmap Scripting Engine: 

The Nmap Scripting Engine (NSE) is one of Nmap’s most influential and adaptable feature. It permits clients to compose (and offer) straightforward scripts to automate a wide variety of systems networking tasks. Those scripts are then executed in parallel with the fast speed and productivity you anticipate from Nmap. Clients can depend on the developing and assorted set of scripts conveyed with Nmap, or compose their own particular to help. All Available script can be seen by using following command

#locate *.nse

locate *.nse in nmap

Nmap Examples of Scripts

–script-help

Shows help about scripts. For each one script matching the given detail, Nmap prints the script name, its classifications, and its categories. The determinations are the same as those acknowledged by -script; so for instance on the off chance that you need help about the afp- and discovery, you would run following command

#nmap –script-help “afp-* and discovery”.

--script-help in nmap

–script-trace

This alternative works at the requisition level instead of parcel by bundle. In the event that this alternative is pointed out, all approaching and friendly correspondence performed by scripts is printed. The showed data incorporates the correspondence convention, source and target locations, and the transmitted information. In the event that more than 5% of transmitted information is unprintable, hex dumps are given.

--script-trace in nmap

–script-updatedb

It is just important to upgrade the database in the event that you have included or expelled NSE scripts from the default scripts catalog or in the event that you have changed the classifications of any script. This choice is utilized independent from anyone else without contentions:

#nmap -script-updatedb.

 --script-updatedb in nmap

A simple script scan by using default set of scripts

#nmap –sC {Target_IP}

nmap -sC

A script scan a target machine without port discovery. This scan only identify host is running or down.

#nmap -sn –sC {Target_IP}

#nmap –Pn -sn –sC {Target_IP}

nmap -sn -sC

This scan is used to scan network without port scanning and without host discovery.

Pnetration tester can execute a specific script with script tracing.

#nmap –script smb-os-discovery –script-trace {target_IP_Address}

nmap –script smb-os-discovery –script-trac

Run a particular script that takes a script argument

 

About Vijay Kumar

Ethical Hacking & Penetration Testing Trainer, For more detail view My Profile

Check Also

Scan Network with Metasploit

Scanning with Metasploit in Kali Linux

Scanning with Metasploit in Kali Linux  Step First: Creating New Project Inside metasploit community a …

Leave a Reply

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Please wait...

Get Instant Updates into Your Inbox

Want to be notified when our article is published? Enter your email address and name below to be the first to know.

Watch Dragon ball super