Vulscan - advanced vulnerability scanning with Nmap NSE

(4,604 views)

Introduction Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the identified product. The data is looked up in an offline version of VulDB. Installation Please install the files into the following folder of your Nmap installation: Nmap\scripts\vulscan\* Clone the GitHub repository like this: git clone https://github.com/scipag/vulscan scipag_vulscan ln -s `pwd`/scipag_vulscan /usr/share/nmap/scripts/vulscan Usage You have to run the following minimal command to initiate a simple vulnerability scan: nmap -sV --script=vulscan/vulscan.nse www.example.com Vulnerability Database There are the following pre-installed databases available at the moment: scipvuldb.csv - https://vuldb.com cve.csv - https://cve.mitre.org securityfocus.csv - https://www.securityfocus.com/bid/ xforce.csv - https://exchange.xforce.ibmcloud.com/ expliotdb.csv - https://www.exploit-db.com openvas.csv - https://www.openvas.org securitytracker.csv - https://www.securitytracker.com (end-of-life) osvdb.csv - https://www.osvdb.org (end-of-life) Single Database Mode You may execute vulscan with the following argument to use a single database: --script-args vulscandb=your_own_database It is also possible to create and reference your own databases. This requires....

May 17, 2021
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.