Enumeration with Nmap Scripts

Raghav
4 min readSep 27, 2021

--

ls -al /usr/share/nmap/scripts/ | grep -e “ftp”
ls -al /usr/share/nmap/scripts/ | grep -e “http”
ls -al /usr/share/nmap/scripts/ | grep -e “smb”
ls -al /usr/share/nmap/scripts/ | grep -e “telnet”
ls -al /usr/share/nmap/scripts/ | grep -e “smtp”
ls -al /usr/share/nmap/scripts/ | grep -e “ssl”
ls -al /usr/share/nmap/scripts/ | grep -e “tls”
ls -al /usr/share/nmap/scripts/ | grep -e “dns”
ls -al /usr/share/nmap/scripts/ | grep -e “mysql”

for more Blog articles and Training Sessions click Here

FTP Enumeration:

ftp-anon.nse
ftp-bounce.nse
ftp-brute.nse
ftp-libopie.nse
ftp-proftpd-backdoor.nse
ftp-syst.nse
ftp-vsftpd-backdoor.nse
ftp-vuln-cve2010–4221.nse
tftp-enum.nse

ftp-anon.nse:

script: sudo nmap — script ftp-anon -p 21 <target ip>

ftp-vuln-cve2010–4221.nse

Checks for a stack-based buffer overflow in the ProFTPD server, version between 1.3.2rc3 and 1.3.3b. By sending a large number of TELNET_IAC escape sequence, the proftpd process miscalculates the buffer length, and a remote attacker will be able to corrupt the stack and execute arbitrary code within the context of the proftpd process (CVE-2010–4221). Authentication is not required to exploit this vulnerability.

script: sudo nmap — script ftp-vuln-cve2010–4221 -p 21 <target ip>

references:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4221

http://www.exploit-db.com/exploits/15449/

http://www.metasploit.com/modules/exploit/freebsd/ftp/proftp_telnet_iac

ftp-libopie.nse

Checks if an FTPd is prone to CVE-2010–1938 (OPIE off-by-one stack overflow), if launched against a vulnerable host, this script will crash the FTPd.

script: sudo nmap — script ftp-libopie -p- <target ip>

ftp-vsftpd-backdoor.nse

This script attempts to exploit the backdoor using the innocuous id. Command to execute in shell (default is id). vsftpd (very secure file transfer protocol deamon).

script: sudo nmap — script ftp-vsftpd-backdoor -p 21 <target ip>

ftp-proftpd-backdoor.nse

This script attempts to exploit the backdoor using the innocuous id, Command to execute in shell (default is id).

script: sudo nmap — script ftp-proftpd-backdoor -p 21 <target ip>

ftp-brute.nse

Performs brute force password auditing against FTP servers. the amount of time to wait for a response on the socket. Lowering this value may result in a higher throughput for servers having a delayed response on incorrect login attempts. (default: 5s). This script uses brute library to perform password
guessing.

script: sudo nmap — script ftp-brute -p 21 <target ip>

ftp-bounce.nse

Checks to see if an FTP server allows port scanning using the FTP bounce method. Username to log in with. Default anonymous. Password to log in with. Default IEUser@. Host to try connecting to with the PORT command.

script: sudo nmap -sV -sC — script ftp-bounce -p 21 <target ip>

ftp-syst.nse

Sends FTP SYST and STAT commands and returns the result.

script: sudo nmap -sV -sC — script ftp-syst -p 21 <target ip>

tftp-enum.nse

Enumerates TFTP (trivial file transfer protocol) filenames by testing for a list of common ones. TFTP doesn’t provide directory listings. This script tries to retrieve filenames from a list. The list is composed of static names from the file tftplist.txt, plus configuration filenames for Cisco devices that change based on the target address, of the form A.B.C.X-confg for an IP address A.B.C.D and for X in 0 to 255. filelist= file name with list of filenames to enumerate at tftp server.

script: nmap -sU -p 69 — script tftp-enum.nse — script-args tftp-enum.filelist=customlist.txt <target>

for more Blog articles and Training Sessions click Here

--

--

Raghav
Raghav

Responses (1)