0% found this document useful (0 votes)
6 views

TLS_Lab Assignment7_NMAP_ Scripting Engine

The document provides an overview of the Nmap Scripting Engine (NSE), detailing its functionality and the use of Lua scripts to enhance Nmap's capabilities beyond basic port scanning. It lists several basic NSE commands for various security assessments, emphasizing the importance of responsible usage on authorized systems. Specific scripts mentioned include those for HTTP enumeration, vulnerability scanning, FTP anonymity checks, and IP geolocation.

Uploaded by

surajkushwahapc
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

TLS_Lab Assignment7_NMAP_ Scripting Engine

The document provides an overview of the Nmap Scripting Engine (NSE), detailing its functionality and the use of Lua scripts to enhance Nmap's capabilities beyond basic port scanning. It lists several basic NSE commands for various security assessments, emphasizing the importance of responsible usage on authorized systems. Specific scripts mentioned include those for HTTP enumeration, vulnerability scanning, FTP anonymity checks, and IP geolocation.

Uploaded by

surajkushwahapc
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

TLS Cryptography Protocol 1

(CSE 2462)
MINOR ASSIGNMENT-7: NMAP Scripting Engine

NSE, or the Nmap Scripting Engine, is a powerful component of the Nmap


(Network Mapper) security scanner. NSE scripts are written in the Lua
programming language and extend the functionality of Nmap by providing
additional capabilities beyond simple port scanning.
[BASIC NSE COMMANDS]
1. dir "C:\Program Files (x86)\Nmap\scripts"
2. dir | findstr "specific name"
3. nmap --script http-enum.nse [target]
Replace [target] with the IP address or domain of the web server you want to
scan.
Keep in mind that while this script can provide valuable information during
security assessments, it's essential to use it responsibly and only on systems
where you have permission to scan.
4. nmap --script vulners.nse [target]
5. nmap --script ftp-anon.nse [target]
6. nmap --script whois-ip.nse <target ip>
7. “nmap --script ip-geolocation-geoplugin.nse <target_ip>” But
sometimes it might not provide accurate details.
Replace <target> with the IP address for which you want to perform
geolocation. The script will then query the Geoplugin service and retrieve
information about the geographic location associated with the specified IP
address.
8. nmap --script whois-domain.nse <target>
9. nmap --script http-waf-detect.nse <target>
10. nmap --script http-traceroute.nse <target>

You might also like