Skip to content

Commit 59d49c3

Browse files
committed
Periodic Update
1 parent 5a1a3f7 commit 59d49c3

File tree

1 file changed

+104
-0
lines changed

1 file changed

+104
-0
lines changed

sections/appendix_f_scripts.md

Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,107 @@
55
```sh
66
nmap --script rtsp-url-brute -p 554 <ip>
77
```
8+
9+
## Detect Sniffers on a Network (host with NIC in promiscuous mode)
10+
11+
```sh
12+
nmap -sV --script=sniffer-detect <target>
13+
```
14+
15+
16+
## Other Common Scripts
17+
18+
- dns-blacklist
19+
Check if host is blacklisted by DNS servers
20+
21+
- dns-zeustracker
22+
Check if host is a part of Zeus botnet
23+
24+
- http-config-backup
25+
Search form CMS config backups
26+
27+
- http-wordpress-enum
28+
Enumerate WordPress plugins
29+
check-latest - check if pluigns are up to date
30+
root - base path of root installation
31+
32+
- mysql-empty-password
33+
Check for anonymous MySQL login
34+
35+
- mysql-users
36+
List SQL users on host
37+
38+
- address-info
39+
Extract information about IPv6 address
40+
41+
- krb5-enum-users
42+
Enumerate Kerberos usernames
43+
* .realm - domain name
44+
* userdb - usernames file
45+
46+
- traceroute-geolocation
47+
Perform geolocation (requires --traceroute flag)
48+
* .kmlfile - name of the KML file to write to
49+
50+
- fingerprint-strings
51+
Print readable banner strings from unknown services
52+
* n - number of characters to print
53+
54+
- ftp-bounce
55+
Check if server allows bounce scanning
56+
57+
- hddtemp-info
58+
Retrieve information from hddtemp service
59+
60+
- ipidseq
61+
Classify host's IP ID sequence
62+
* probeport - destination port to probe
63+
64+
- modbus-discover
65+
Enumerate SCADA slaves and get information about deFanavice and firmware
66+
* aggressive - enumerate all slaves (not only first sid)
67+
68+
- path-mtu
69+
Check the maximum length of non-fragmented packets
70+
71+
- qscan
72+
Probe ports to obtain round-trip time value and search forn anomalies
73+
* numclosed - max number of closed ports to probe (default: 1, negaive to disable the limit)
74+
* numopen - maximum number of opened ports to probe (default: 8)
75+
* numtrips - number of RTTs to get
76+
* delay - average delay between packets (default: 200ms)
77+
78+
- reverse-index
79+
Show which host runs particular serice
80+
* mode - [horizontal|vertical]
81+
* names - index by service names rather than ports
82+
83+
84+
- smb-os-discovery
85+
Pull host info (OS, workgroup etc.)
86+
87+
- sniffer-detect
88+
Check if target has network card in promiscous mode
89+
90+
- targets-sniffer
91+
Sniff the network for hosts and add them to scanning queue
92+
* iface - interface used for sniffing
93+
* timeout - listening time (default: 10s)
94+
* newtargets - add found targets to scan queue
95+
96+
- unusual-port
97+
Report deviations if service is running on uncommon port
98+
99+
- xmlrpc-methods
100+
List available XMLRPC methods
101+
102+
- snmp-[interfaces|netstat]
103+
Extract info from SNMP service
104+
105+
- ldap-search
106+
Perform queries against LDAP protocol
107+
* ldap.username, ldap.password - credentials to use
108+
* ldap.qfilter - quick filter to use [all|ad_dcs|users|computers|custom]
109+
* ldap.attrib - comma-separated LDAP attributes to pull, enclosed with curly brackets
110+
Set this to ms-Mcs-AdmPwd to extract cleartext passwords from LAPS
111+
* ldap.savesearch - file prefix to save gathered data to, constructed as <prefix>_<ip>_<port>.csv

0 commit comments

Comments
 (0)