nmap –script 使用:nmap-vulners 和 vulscan出现错误 ‘/usr/bin/../share/nmap/scripts/vulscan’ found, but will

在新版本nmap中,添加了scripts功能使用,其存储在nmap的安装目录的scripts中,例如 /usr/share/nmap/scripts,已含有将600+个写好的丰富脚本,本文主要讲解在添加nmap-vulners和vulscan脚本后,扫描过程中出现的’/usr/bin/../share/nmap/scripts/vulscan’ found, but will not match without ‘/’问题

使用vulscan扫描错误日志,分析得知缺少”/”

# nmap --script vulscan  -sV 192.168.1.8                                                                                           127 ⨯
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-18 23:11 EDT
NSE: failed to initialize the script engine:
/usr/bin/../share/nmap/nse_main.lua:821: directory '/usr/bin/../share/nmap/scripts/vulscan' found, but will not match without '/'
stack traceback:
        [C]: in function 'error'
        /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
        /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
        [C]: in ?

QUITTING!

查看官方使用方法:vim /usr/share/nmap/scripts/vulscan/vulscan.nse

vulscansshshishs

提示需要指定.nse的文件地址,才能使用

#nmap --script=vulscan/vulscan.nse  -sV 192.168.238.129
Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-18 23:28 EDT

#nmap --script=vulscan/vulscan.nse --script-args vulscandb=cve.csv  -sV 192.168.238.129
.....
 [CVE-2004-0726] The Windows Media Player control in Microsoft Windows 2000 allows remote attackers to execute arbitrary script in the local computer zone via an ASX filename that contains javascript, which is executed in the local context in a preview panel.
| [CVE-2004-0719] Internet Explorer for Mac 5.2.3, Internet Explorer 6 on Windows XP, and possibly other versions, does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
| [CVE-2004-0573] Buffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
| [CVE-2004-0571] Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.
| [CVE-2004-0569] The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote attackers to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values.
| [CVE-2004-0568] HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
| [CVE-2004-0484] mshtml.dll in Microsoft Internet Explorer 6.0.2800 allows remote attackers to cause a denial of service (crash) via a table containing a form that crosses multiple td elements, and whose "float: left" class is defined in a link to a CSS stylesheet after the end of the table, which may trigger a null dereference.

如果遇到这种错误,关键主要是没有找到对应nse脚本进行执行导致,其他nse脚本执行扫描使用用同样的方法,同时查看当前nse的操作手册。

vulners scan nse

 

map --script=nmap-vulners/vulners.nse  -sV 192.168.238.129
评论 8
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值