Nmap Development mailing list archives

Re: Proposal for adding new option to nmap


From: Patrick Donnelly <batrick () batbytes com>
Date: Thu, 1 Jul 2010 11:14:06 -0400

On Thu, Jul 1, 2010 at 3:04 AM, kirubakaran S <kirubakaran1989 () gmail com> wrote:
Proposed solution:
    To include a command line option in nmap,  "--script-list" that
prints the list of scripts that meets the specification criteria.

nse_main.lua already prints out the list of scripts chosen if
debugging is at two or higher:

batrick@batbytes:~/nmap/svn/nmap$ ./nmap --datadir . --script *http* -d2

Starting Nmap 5.30BETA1 ( http://nmap.org ) at 2010-07-01 11:12 EDT
Fetchfile found ./nmap-services
PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)
The max # of sockets we are using is: 0
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
Fetchfile found ./nse_main.lua
Fetchfile found ./nselib/
Fetchfile found ./scripts/script.db
Fetchfile found ./scripts/http-auth.nse
NSE: Script http-auth.nse was selected by name.
Fetchfile found ./scripts/http-date.nse
NSE: Script http-date.nse was selected by name.
Fetchfile found ./scripts/http-enum.nse
NSE: Script http-enum.nse was selected by name.
Fetchfile found ./scripts/http-favicon.nse
NSE: Script http-favicon.nse was selected by name.
Fetchfile found ./scripts/http-headers.nse
NSE: Script http-headers.nse was selected by name.
Fetchfile found ./scripts/http-iis-webdav-vuln.nse
NSE: Script http-iis-webdav-vuln.nse was selected by name.
Fetchfile found ./scripts/http-malware-host.nse
NSE: Script http-malware-host.nse was selected by name.
Fetchfile found ./scripts/http-methods.nse
NSE: Script http-methods.nse was selected by name.
Fetchfile found ./scripts/http-open-proxy.nse
NSE: Script http-open-proxy.nse was selected by name.
Fetchfile found ./scripts/http-passwd.nse
NSE: Script http-passwd.nse was selected by name.
Fetchfile found ./scripts/http-php-version.nse
NSE: Script http-php-version.nse was selected by name.
Fetchfile found ./scripts/http-trace.nse
NSE: Script http-trace.nse was selected by name.
Fetchfile found ./scripts/http-userdir-enum.nse
NSE: Script http-userdir-enum.nse was selected by name.
Fetchfile found ./scripts/http-vmware-path-vuln.nse
NSE: Script http-vmware-path-vuln.nse was selected by name.
NSE: Loaded 14 scripts for scanning.
NSE: Loaded 'http-auth.nse'.
NSE: Loaded 'http-date.nse'.
NSE: Loaded 'http-enum.nse'.
NSE: Loaded 'http-favicon.nse'.
NSE: Loaded 'http-headers.nse'.
NSE: Loaded 'http-iis-webdav-vuln.nse'.
NSE: Loaded 'http-malware-host.nse'.
NSE: Loaded 'http-methods.nse'.
NSE: Loaded 'http-open-proxy.nse'.
NSE: Loaded 'http-passwd.nse'.
NSE: Loaded 'http-php-version.nse'.
NSE: Loaded 'http-trace.nse'.
NSE: Loaded 'http-userdir-enum.nse'.
NSE: Loaded 'http-vmware-path-vuln.nse'.
Read from .: nmap-services.
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 0.07 seconds


No targets needed to be specified. Is this sufficient?

-- 
- Patrick Donnelly
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

Current thread: