Nmap Development mailing list archives

Re: MS 08-067 and Zenmap


From: "Onur Akgun" <fincan () gmail com>
Date: Tue, 2 Dec 2008 10:37:40 -0500

Just a quick reminder; that script is not in the latest stable, you have to
pull it from SVN and compile it. More info about SVN repository is at:
http://nmap.org/book/install.html#inst-svn

Onur






------------------------------


Date: Mon, 1 Dec 2008 20:37:29 +0000
From: Brandon Enright <bmenrigh () ucsd edu>
Subject: Re: MS 08-067 and Zenmap
To: "Pelletier, Frank" <francois.pelletier () yale edu>
Cc: "nmap-dev () insecure org" <nmap-dev () insecure org>, bmenrigh () ucsd edu
Message-ID: <20081201203729.3c3d858a@gamma>
Content-Type: text/plain; charset=US-ASCII

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 1 Dec 2008 12:33:00 -0500
"Pelletier, Frank" <francois.pelletier () yale edu> wrote:

Hello, are there any command scripts that can be run against a
network ex., 130.132.70/24 that would report the MS08-067 vulnerable
systems on these /24 networks?

I have found some scripts for versions of Unix. I however use the
Windows platform.  I know there are various reasons for moving OS,
but at this time and with the ZenMap the windows command script(s)
are what is needed.

Thanks
Frank Pelletier
ISO, ITS


This should do it for you:

nmap -sCSU -p U:137,T:135,139,445 -T4 -PN -n -v
--script=smb-check-vulns.nse 130.132.70.0/24

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkk0Sw8ACgkQqaGPzAsl94L49ACfXq7GU+T1NTbPWNTWVWyzgCSv
eOgAoL1XK6LOJ7+XgjOc0MzADeWOkU7S
=b6N3
-----END PGP SIGNATURE-----




_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: