The document provides an overview of the Nmap Scripting Engine (NSE), detailing its functionality and the use of Lua scripts to enhance Nmap's capabilities beyond basic port scanning. It lists several basic NSE commands for various security assessments, emphasizing the importance of responsible usage on authorized systems. Specific scripts mentioned include those for HTTP enumeration, vulnerability scanning, FTP anonymity checks, and IP geolocation.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
6 views
TLS_Lab Assignment7_NMAP_ Scripting Engine
The document provides an overview of the Nmap Scripting Engine (NSE), detailing its functionality and the use of Lua scripts to enhance Nmap's capabilities beyond basic port scanning. It lists several basic NSE commands for various security assessments, emphasizing the importance of responsible usage on authorized systems. Specific scripts mentioned include those for HTTP enumeration, vulnerability scanning, FTP anonymity checks, and IP geolocation.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
TLS Cryptography Protocol 1
(CSE 2462) MINOR ASSIGNMENT-7: NMAP Scripting Engine
NSE, or the Nmap Scripting Engine, is a powerful component of the Nmap
(Network Mapper) security scanner. NSE scripts are written in the Lua programming language and extend the functionality of Nmap by providing additional capabilities beyond simple port scanning. [BASIC NSE COMMANDS] 1. dir "C:\Program Files (x86)\Nmap\scripts" 2. dir | findstr "specific name" 3. nmap --script http-enum.nse [target] Replace [target] with the IP address or domain of the web server you want to scan. Keep in mind that while this script can provide valuable information during security assessments, it's essential to use it responsibly and only on systems where you have permission to scan. 4. nmap --script vulners.nse [target] 5. nmap --script ftp-anon.nse [target] 6. nmap --script whois-ip.nse <target ip> 7. “nmap --script ip-geolocation-geoplugin.nse <target_ip>” But sometimes it might not provide accurate details. Replace <target> with the IP address for which you want to perform geolocation. The script will then query the Geoplugin service and retrieve information about the geographic location associated with the specified IP address. 8. nmap --script whois-domain.nse <target> 9. nmap --script http-waf-detect.nse <target> 10. nmap --script http-traceroute.nse <target>