Vulnerability Assessment Using Nmap
Vulnerability Assessment Using Nmap
Introduction to Nmap
Use Cases
The tool is one of the most used tools by network administrators and IT
security specialists. It is used to:
Network mapping
Response analysis
Nmap Architecture
Nmap offers many different types of scans that can be used to obtain various
results about our targets. Basically, Nmap can be divided into the following
scanning techniques:
Host discovery
Port scanning
OS detection
Syntax
The syntax for Nmap is fairly simple and looks like this:
Introduction to Nmap
alamgirhossain17@htb[/htb]$ nmap <scan types> <options>
<target>
Scan Techniques
Here is a range of Nmap commands, starting from basic to more advanced techniques, to help you
with network scanning.
nmap --help
<SNIP>
SCAN TECHNIQUES:
-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
-sU: UDP Scan
-sN/sF/sX: TCP Null, FIN, and Xmas scans
--scanflags <flags>: Customize TCP scan flags
-sI <zombie host[:probeport]>: Idle scan
-sY/sZ: SCTP INIT/COOKIE-ECHO scans
-sO: IP protocol scan
-b <FTP relay host>: FTP bounce scan
<SNIP>
Basic Commands
Port Scan: Scan the most common 1000 ports on a single host.
nmap 192.168.1.1
nmap 192.168.1.1-254
Intermediate Commands
Service Version Detection: Determine the version of services running on open ports.
nmap -O 192.168.1.1
Aggressive Scan: Perform an aggressive scan including OS detection, version detection, script scanning,
and traceroute.
nmap -A 192.168.1.1
Scan with TCP SYN Scan (default): The most common scan that sends SYN packets.
Advanced Commands Timing and Performance: Adjust the timing template (0 is slowest, 5 is fastest).
Scan a Subnet for Open Ports: Scan a whole subnet to find open ports.
NSE (Nmap Scripting Engine): Use scripts for advanced service detection, vulnerability detection, etc.
Scan Evading Techniques: Use decoys to hide the origin of the scan.
Scan Firewall and IDS Evasion: Try to evade firewall and IDS.
Comprehensive Scan:
These commands should give you a solid foundation for using Nmap effectively, from basic network
discovery to advanced and stealthy scanning techniques. Always ensure you have permission to scan the
networks and devices you target.
To scan for vulnerabilities and save the output to a file using Nmap, you can use the Nmap Scripting
Engine (NSE) along with the -oN, -oX, or -oG options to save the output in different formats. Here's how
you can perform a vulnerability scan and save the results:
This command runs the vuln script, which includes a collection of vulnerability detection scripts, and
saves the output in normal format to output.txt.
This runs multiple vulnerability detection scripts (in this case, vuln, ssl-heartbleed, and http-enum) and
saves the output to output.txt.
nmap -p 1-65535 -sV -sS -T4 -A -O --script vuln 192.168.1.1 -oN output.txt -oX output.xml -oG
output.gnmap
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
OS detection (-O)
And saves the output in normal (output.txt), XML (output.xml), and grepable (output.gnmap) formats.
This runs the http-vuln-cve2017-5638 script (which checks for a specific CVE) against port 80 and saves
the output to output.txt.
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
By using the -oN, -oX, or -oG options, you can ensure that the results of your vulnerability scans are
saved for later analysis and reporting.
Here are some Nmap commands tailored for scanning and probing DNS servers, from basic to advanced:
Basic DNS Service Discovery: Check if the DNS service (port 53) is open on a host.
nmap -p 53 192.168.1.1
Service Version Detection: Identify the version of the DNS service running.
Zone Transfer Check: Check if the DNS server allows zone transfers (a common misconfiguration).
DNS Cache Snooping: Determine if the DNS server is caching specific DNS queries.
DNS Enumeration: Enumerate common DNS records (like MX, NS, A, etc.) for a given domain.
Recursive DNS Server Detection: Check if the DNS server allows recursive queries.
Comprehensive DNS Security Scan: Combine multiple DNS-related NSE scripts for a thorough analysis.
Save DNS Brute Force Output: Save the results of a DNS brute force scan to a file.
Save Comprehensive DNS Scan Output: Save the results of a comprehensive DNS scan to multiple
formats.
Check for Specific DNS Vulnerability: Check for a specific DNS vulnerability (e.g., DNS Cache Poisoning).
DNS Service Enumeration with Specific Arguments: Run DNS enumeration with specific script
arguments.
Detect DNS Amplification DDoS Vulnerability: Check if the DNS server can be used for amplification
attacks.
By using these commands, you can effectively scan and analyze DNS servers, from basic service checks
to advanced security assessments. Always ensure you have permission to scan the DNS servers you
target.
Here are Nmap commands specifically tailored for scanning and probing database servers, from basic to
advanced:
Basic Service Discovery: Check if a specific database service port is open (e.g., MySQL on port 3306).
Multiple Database Ports: Scan for common database ports (e.g., MySQL, PostgreSQL, SQL Server,
Oracle).
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
nmap -p 3306,5432,1433,1521 192.168.1.1
Service Version Detection: Identify the version of the database services running.
Aggressive Scan: Perform an aggressive scan including OS detection, version detection, script scanning,
and traceroute
Default Scripts Scan: Use default NSE scripts for more detailed information.
Database Specific Scripts: Use Nmap scripts for specific database services to gather more detailed
information.
Brute Force MySQL Login: Attempt to brute force MySQL login credentials.
Check for MySQL Weak Passwords: Check if MySQL service has weak passwords.
Check for PostgreSQL Weak Passwords: Check if PostgreSQL service has weak passwords.
MS SQL Server Brute Force: Attempt to brute force MS SQL Server login credentials.
Save MySQL Scan Output: Save the results of a MySQL specific scan to a file.
These commands provide a robust set of tools to effectively scan and analyze database servers, from
basic service checks to advanced security assessments. Always ensure you have the necessary
permissions to scan the database servers you target.
Here are Nmap commands specifically tailored for scanning and probing web servers, from basic to
advanced:
Basic Port Scan: Check if the HTTP (port 80) and HTTPS (port 443) services are open.
Service Version Detection: Identify the version of the web server software running.
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
nmap -sV -p 80,443 192.168.1.1
Scan All Ports: Scan for any open ports on the web server.
Aggressive Scan: Perform an aggressive scan including OS detection, version detection, script scanning,
and traceroute.
Default Scripts Scan: Use default NSE scripts for more detailed information about the web server.
Web Application Firewall Detection: Detect if a web application firewall (WAF) is present.
Directory Brute Force: Attempt to brute force directories and files on the web server.
Check for Heartbleed Vulnerability: Specifically check for the Heartbleed vulnerability.
Check for Shellshock Vulnerability: Specifically check for the Shellshock vulnerability.
Save HTTP Enumeration Output: Save the results of an HTTP enumeration scan to a file.
Save Comprehensive Web Server Scan Output: Save the results of a comprehensive web server scan to
multiple formats.
Advanced Techniques
These commands should provide a comprehensive toolkit for effectively scanning and analyzing web
servers, from basic service checks to advanced security assessments. Always ensure you have
permission to scan the web servers you target.
Here are some Nmap commands specifically tailored for scanning and probing network firewalls, from
basic to advanced:
Ping Scan: Determine which hosts are up without scanning any ports.
Service Version Detection: Identify the services running behind the firewall.
Aggressive Scan: Perform an aggressive scan including OS detection, version detection, script scanning,
and traceroute.
nmap -A 192.168.1.1
Stealth Scan (SYN Scan): Perform a stealthy scan to detect open ports without completing the TCP
handshake.
UDP Scan: Check for open UDP ports, which can be useful for firewall rule detection.
Firewall Evasion Techniques: Fragment packets to evade firewalls and IDS/IPS systems.
nmap -f 192.168.1.1
Idle Scan: Use a third-party host to send probes to the target, making it appear as if the third-party host
is the source of the scan.
Detecting Firewall Rules with ACK Scan: Send ACK packets to determine which ports are filtered.
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
nmap -sA 192.168.1.1
FIN Scan: Send FIN packets to detect open ports through firewalls.
Xmas Scan: Send Xmas-tree packets to probe open ports through firewalls.
Save Stealth Scan Output: Save the results of a stealth scan to a file.
Save Comprehensive Firewall Scan Output: Save the results of a comprehensive firewall scan to multiple
formats.
nmap -p 1-65535 -sS -sU -T4 -A -O --script firewall-bypass 192.168.1.1 -oN firewall-scan-output.txt -oX
firewall-scan-output.xml -oG firewall-scan-output.gnmap
Advanced Techniques
Timing and Performance: Adjust the timing template (0 is slowest, 5 is fastest) for evasion and
performance tuning.
nmap -O 192.168.1.1
These commands provide a comprehensive toolkit for effectively scanning and analyzing network
firewalls, from basic checks to advanced evasion techniques. Always ensure you have permission to scan
the network firewalls you target.
─[✗]─[root@parrot]─[/home/user]
─[✗]─[root@parrot]─[/home/user]
| cpe:/a:proftpd:proftpd:1.3.3c:
| SAINT:FD1752E124A72FD3A26EEB9B315E8382 10.0
https://vulners.com/saint/SAINT:FD1752E124A72FD3A26EEB9B315E8382 *EXPLOIT*
| SAINT:ECC52DD75C7865AF72D358DC03E39270 10.0
https://vulners.com/saint/SAINT:ECC52DD75C7865AF72D358DC03E39270 *EXPLOIT*
| SAINT:C38482A29286C4F6E5C4BD19DFFEC245 10.0
https://vulners.com/saint/SAINT:C38482A29286C4F6E5C4BD19DFFEC245 *EXPLOIT*
| SAINT:950EB68D408A40399926A4CCAD3CC62E 10.0
https://vulners.com/saint/SAINT:950EB68D408A40399926A4CCAD3CC62E *EXPLOIT*
| SAINT:63FB77B9136D48259E4F0D4CDA35E957 10.0
https://vulners.com/saint/SAINT:63FB77B9136D48259E4F0D4CDA35E957 *EXPLOIT*
| SAINT:54FCA613A72A46139DD6F86DF77D354A 10.0
https://vulners.com/saint/SAINT:54FCA613A72A46139DD6F86DF77D354A *EXPLOIT*
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
| SAINT:1B08F4664C428B180EEC9617B41D9A2C 10.0
https://vulners.com/saint/SAINT:1B08F4664C428B180EEC9617B41D9A2C *EXPLOIT*
| SAINT:0D292D8F05ADFBE8F747F01E40BAF2AF 10.0
https://vulners.com/saint/SAINT:0D292D8F05ADFBE8F747F01E40BAF2AF *EXPLOIT*
| MSF:EXPLOIT-UNIX-FTP-PROFTPD_MODCOPY_EXEC- 10.0
https://vulners.com/metasploit/MSF:EXPLOIT-UNIX-FTP-PROFTPD_MODCOPY_EXEC-
*EXPLOIT*
| MSF:EXPLOIT-LINUX-FTP-PROFTP_TELNET_IAC- 10.0
https://vulners.com/metasploit/MSF:EXPLOIT-LINUX-FTP-PROFTP_TELNET_IAC-
*EXPLOIT*
| MSF:EXPLOIT-FREEBSD-FTP-PROFTP_TELNET_IAC- 10.0
https://vulners.com/metasploit/MSF:EXPLOIT-FREEBSD-FTP-PROFTP_TELNET_IAC-
*EXPLOIT*
| 95499236-C9FE-56A6-9D7D-E943A24B633A 10.0
https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A
*EXPLOIT*
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
| 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0
https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT*
| 739FE495-4675-5A2A-BB93-EEF94AC07632 7.5
https://vulners.com/githubexploit/739FE495-4675-5A2A-BB93-EEF94AC07632 *EXPLOIT*
| ftp-proftpd-backdoor:
| Command: id
22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu2.2 (Ubuntu Linux; protocol 2.0)
| vulners:
| cpe:/a:openbsd:openssh:7.2p2:
| 95499236-C9FE-56A6-9D7D-E943A24B633A 10.0
https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A
*EXPLOIT*
| 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0
https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT*
| B8190CDB-3EB9-5631-9828-8064A1575B23 9.8
https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23 *EXPLOIT*
| 8FC9C5AB-3968-5F3C-825E-E8DB5379A623 9.8
https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623 *EXPLOIT*
| 8AD01159-548E-546E-AA87-2DE89F3927EC 9.8
https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC *EXPLOIT*
| 5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A 9.8
https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A
*EXPLOIT*
| F0979183-AE88-53B4-86CF-3AF0523F3807 7.5
https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807 *EXPLOIT*
| C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3 6.8
https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3 *EXPLOIT*
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
| 10213DBE-F683-58BB-B6D3-353173626207 6.8
https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207 *EXPLOIT*
| EXPLOITPACK:98FE96309F9524B8C84C508837551A19 5.8
https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19
*EXPLOIT*
| EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97 5.8
https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97
*EXPLOIT*
| EXPLOITPACK:F92411A645D85F05BDBD274FD222226F 5.5
https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F
*EXPLOIT*
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
| EXPLOITPACK:9F2E746846C3C623A27A441281EAD138 5.5
https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138
*EXPLOIT*
| EXPLOITPACK:1902C998CBF9154396911926B4C3B330 5.5
https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330
*EXPLOIT*
| MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS- 5.3
https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-
*EXPLOIT*
| EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0 5.0
https://vulners.com/exploitpack/EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0
*EXPLOIT*
| EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283 5.0
https://vulners.com/exploitpack/EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283
*EXPLOIT*
| EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF 4.3
https://vulners.com/exploitpack/EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF
*EXPLOIT*
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
| EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF 4.3
https://vulners.com/exploitpack/EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF
*EXPLOIT*
| vulners:
| cpe:/a:apache:http_server:2.4.18:
| 95499236-C9FE-56A6-9D7D-E943A24B633A 10.0
https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A
*EXPLOIT*
| 2C119FFA-ECE0-5E14-A4A4-354A2C38071A 10.0
https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A *EXPLOIT*
| F607361B-6369-5DF5-9B29-E90FA29DC565 9.8
https://vulners.com/githubexploit/F607361B-6369-5DF5-9B29-E90FA29DC565 *EXPLOIT*
| B02819DB-1481-56C4-BD09-6B4574297109 9.8
https://vulners.com/githubexploit/B02819DB-1481-56C4-BD09-6B4574297109*EXPLOIT*
| 5C1BB960-90C1-5EBF-9BEF-F58BFFDFEED9 9.8
https://vulners.com/githubexploit/5C1BB960-90C1-5EBF-9BEF-F58BFFDFEED9 *EXPLOIT*
| 3F17CA20-788F-5C45-88B3-E12DB2979B7B 9.8
https://vulners.com/githubexploit/3F17CA20-788F-5C45-88B3-E12DB2979B7B *EXPLOIT*
| 0486EBEE-F207-570A-9AD8-33269E72220A 9.1
https://vulners.com/githubexploit/0486EBEE-F207-570A-9AD8-33269E72220A *EXPLOIT*
| AE3EF1CC-A0C3-5CB7-A6EF-4DAAAFA59C8C 9.0
https://vulners.com/githubexploit/AE3EF1CC-A0C3-5CB7-A6EF-4DAAAFA59C8C
*EXPLOIT*
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
| 8AFB43C5-ABD4-52AD-BB19-24D7884FF2A2 9.0
https://vulners.com/githubexploit/8AFB43C5-ABD4-52AD-BB19-24D7884FF2A2
*EXPLOIT*
| 7F48C6CF-47B2-5AF9-B6FD-1735FB2A95B2 9.0
https://vulners.com/githubexploit/7F48C6CF-47B2-5AF9-B6FD-1735FB2A95B2 *EXPLOIT*
| 4810E2D9-AC5F-5B08-BFB3-DDAFA2F63332 9.0
https://vulners.com/githubexploit/4810E2D9-AC5F-5B08-BFB3-DDAFA2F63332
*EXPLOIT*
| 4373C92A-2755-5538-9C91-0469C995AA9B 9.0
https://vulners.com/githubexploit/4373C92A-2755-5538-9C91-0469C995AA9B *EXPLOIT*
| 36618CA8-9316-59CA-B748-82F15F407C4F 9.0
https://vulners.com/githubexploit/36618CA8-9316-59CA-B748-82F15F407C4F *EXPLOIT*
| B0A9E5E8-7CCC-5984-9922-A89F11D6BF38 8.2
https://vulners.com/githubexploit/B0A9E5E8-7CCC-5984-9922-A89F11D6BF38 *EXPLOIT*
| MSF:AUXILIARY-SCANNER-HTTP-APACHE_OPTIONSBLEED- 7.5
https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-HTTP-APACHE_OPTIONSBLEED-
*EXPLOIT*
| F7F6E599-CEF4-5E03-8E10-FE18C4101E38 7.5
https://vulners.com/githubexploit/F7F6E599-CEF4-5E03-8E10-FE18C4101E38 *EXPLOIT*
| DB6E1BBD-08B1-574D-A351-7D6BB9898A4A 7.5
https://vulners.com/githubexploit/DB6E1BBD-08B1-574D-A351-7D6BB9898A4A
*EXPLOIT*
| BD3652A9-D066-57BA-9943-4E34970463B9 7.5
https://vulners.com/githubexploit/BD3652A9-D066-57BA-9943-4E34970463B9
*EXPLOIT*
| B5E74010-A082-5ECE-AB37-623A5B33FE7D 7.5
https://vulners.com/githubexploit/B5E74010-A082-5ECE-AB37-623A5B33FE7D*EXPLOIT*
| B0208442-6E17-5772-B12D-B5BE30FA5540 7.5
https://vulners.com/githubexploit/B0208442-6E17-5772-B12D-B5BE30FA5540 *EXPLOIT*
| A820A056-9F91-5059-B0BC-8D92C7A31A52 7.5
https://vulners.com/githubexploit/A820A056-9F91-5059-B0BC-8D92C7A31A52
*EXPLOIT*
| A0F268C8-7319-5637-82F7-8DAF72D14629 7.5
https://vulners.com/githubexploit/A0F268C8-7319-5637-82F7-8DAF72D14629 *EXPLOIT*
| 9814661A-35A4-5DB7-BB25-A1040F365C81 7.5
https://vulners.com/githubexploit/9814661A-35A4-5DB7-BB25-A1040F365C81
*EXPLOIT*
| 5A864BCC-B490-5532-83AB-2E4109BB3C31 7.5
https://vulners.com/githubexploit/5A864BCC-B490-5532-83AB-2E4109BB3C31
*EXPLOIT*
| 45D138AD-BEC6-552A-91EA-8816914CA7F4 7.5
https://vulners.com/githubexploit/45D138AD-BEC6-552A-91EA-8816914CA7F4
*EXPLOIT*
| 17C6AD2A-8469-56C8-BBBE-1764D0DF1680 7.5
https://vulners.com/githubexploit/17C6AD2A-8469-56C8-BBBE-1764D0DF1680
*EXPLOIT*
| EXPLOITPACK:44C5118F831D55FAF4259C41D8BDA0AB 7.2
https://vulners.com/exploitpack/EXPLOITPACK:44C5118F831D55FAF4259C41D8BDA0AB
*EXPLOIT*
| 0095E929-7573-5E4A-A7FA-F6598A35E8DE 6.8
https://vulners.com/githubexploit/0095E929-7573-5E4A-A7FA-F6598A35E8DE *EXPLOIT*
| EXPLOITPACK:2666FB0676B4B582D689921651A30355 5.0
https://vulners.com/exploitpack/EXPLOITPACK:2666FB0676B4B582D689921651A30355
*EXPLOIT*
| 4013EC74-B3C1-5D95-938A-54197A58586D 4.3
https://vulners.com/githubexploit/4013EC74-B3C1-5D95-938A-54197A58586D
*EXPLOIT*
| http-slowloris-check:
| VULNERABLE:
| IDs: CVE:CVE-2007-6750
| Slowloris tries to keep many connections to the target web server open and hold
| the target web server and sending a partial request. By doing so, it starves
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
|_ http://ha.ckers.org/slowloris/
Link: https://github.com/shafdo/ProFTPD-1.3.3c-
Backdoor_Command_Execution_Automated_Script
Open Parrot machine and Install the Backdoor
Vulnerability Assessment & Penetration Testing
Nmap Basic to Advance Command
Blue Team Bangladesh Ltd
#git clone https://github.com/shafdo/ProFTPD-1.3.3c-
Backdoor_Command_Execution_Automated_Script.git
End