Nmap scripts

From SkullSpace Wiki
Revision as of 14:41, 4 October 2017 by Takaji (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Info.png This page has been archived. All information in this article is historical.
  • Bruteforce framework improvements
    • Handle arbitrary number of inputs (e.g., username, password, repository)
    • Handle arbitrary number of dictionaries per input
    • Handle arbitrary number of command-line literal strings for inputs
    • Store tables with successful inputs in registry
    • Scripts to write:
      • CVS pserver (started)
      • SVN (port to framework)
      • Git (port to framework)
      • Monotone
      • Mercurial
      • Bazaar
      • DNSrecon [1]
      • Synergy (bruteforce, maybe)
      • NRPE (submitted, but not bruteforce)
      • IMAP
      • SNMP (port to framework)
      • POP (port to framework)
      • Metasploit XML-RPC interface [2]
      • Nessus daemon
      • TFTP paths
  • Dropbox LanSync broadcast (submitted)
  • Exim
    • Exploit
  • http spider
    • Needs finishing
  • Signatures for http-enum web apps
  • SNMP BSSID
  • Update brute scripts to use brute.lua
  • SOAP library
  • Debian OpenSSL blacklist [3]
  • PostgreSQL info
  • My IP neighbours
  • Geolocation
  • Bonjour
  • Nbstat.nse -> change to using a broadcast prerule
  • IPsec IKE enumeration
  • IPv6 stuff [4]
    • Neighbour Discovery
    • Router Solicitation
  • 802.1X / EAP
  • SSL renegotiation [5]
  • Microsoft hidden SSL certs [6]
  • Linux local commands over ssh
  • Windows installed software (registry/uninstall)
    • Prefetch
  • Windows MSRPC clone of rpcinfo.nse
  • DCOM
  • WMI - hard++
  • sip
    • brute
    • enum