Introduction
Nmap Scripting Engine (NSE) has been one
of the most efficient features of Nmap which lets users prepare and share their
scripts to automate the numerous tasks that are involved in networking. As we
know about the Nmap’s speed and.
competence, it allows executing these scripts side-by-side. According to
the needs of the users, they can pick from the range of available scripts or
can create their scripts as per the requirements.
Table of Contents
·
Introduction
·
.nse Scripts
o
ms17-010 Vulnerability
o
Vsftpd backdoor
o
SSL-Poodle Vulnerability
o
Rmi classloader vulnerablility
o
HTTP Slowloris vulnerability
·
Nmap-Vulners
·
Conclusion
So, let’s get started with listing all the
scripts that are available for discovering the vulnerability. Here we see that
a list of scripts are available to detect the vulnerabilities. One by one we
will run these scripts and check for vulnerabilities.
cd /usr/share/nmap/scripts/
ls -al *vulns*
ms17-010 Vulnerability
This script detects whether a SMBv1 server in
Microsoft systems is vulnerable to the remote code execution which is commonly
known as the EternalBlue vulnerability. This vulnerability had been
vastly exploited by ransomwares like WannaCry. This works on Windows XP, 2003, 7, 8, 8.1, 10, and server 2008, 2012
and 2016.
You see that on executing this
script, you see that the system is susceptible to the vulnerability which is at
high risk in nature.
nmap --script smb-vuln-ms17-010.nse
192.168.1.16
Vsftpd backdoor
This script checks for the presence of vsFTPd
2.3.4 backdoor vulnerability by attempting to exploit the backdoor using a
harmful command.
nmap --script ftp-vsftpd-backdoor -p 21
SSL-Poodle Vulnerability
The SSL Poodle is a Man-in the middle
exploit whose purpose is to take advantage of the security software running on
SSL. On running this script, you see that the system is vulnerable.
nmap –script ssl-poodle 192.168.1.12
Rmi classloader vulnerablility
This script checks whether Java rmiregistry allows class loads or
not. The rmiregistry has default configuration which allows the class to load
from remote URLs which may lead to remote code execution.
nmap --script=rmi-vuln-classloader -p 1099 192.168.1.12
HTTP Slowloris vulnerability
It checks for the vulnerability in the web server Slowloris
DoS attack where it does not launch an actual DoS attack. This script will open
2 separate connections to the server and then request for URL in base
configuration.
nmap –script http-slowloris-check 192.168.1.12
SSL-CCS-Injection
This script when run checks if a server is
vulnerable to the SSL/TLS "CCS Injection" vulnerability. To exploit
this vulnerability using MITM (Man in the Middle Attack), the attacker will
then wait for a new TLS connection which will be followed by Client-Sever
‘Hello’ handshake messages.
Nmap –script ssl-ccs-injection -p 5432
192.168.1.12
Nmap-Vulners
Nmap - Vulners is a NSE script using some well-known service
to provide info on vulnerabilities. This script completely depends on having
information on software versions therefore works with -sV flag.
You can install
it using git hub code. Then update the scripts in the NSE database.
git clone https://github.com/vulnersCom/nmap-vulners
use/share/nmap/scripts/vulners
nmap --scripts-updatedb
Let us load the scripts and check the
service versions available on the target machine using nmap vulners. Here we
see that all the scripts are loaded which can be used for the vulnerability
detection based on a particular service version.
nmap -sV -Pn 192.168.1.12
--script=vulners/vulners.nse
Conclusion
Hence, we see that it using the nmap
scripts we can detect the vulnerabilities present on the system which can be a
benefit for the Pen Testers.
0 comments:
Post a Comment