Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/vulnersCom/nmap-vulners

NSE script based on Vulners.com API
https://github.com/vulnersCom/nmap-vulners

Last synced: about 1 month ago
JSON representation

NSE script based on Vulners.com API

Awesome Lists containing this project

README

        

# nmap_vulners

[![Current Release](https://img.shields.io/github/release/vulnersCom/nmap-vulners.svg "Current Release")](https://github.com/vulnersCom/nmap-vulners/releases/latest)
[![Downloads](https://img.shields.io/github/downloads/vulnersCom/nmap-vulners/total.svg "Downloads")](https://github.com/vulnersCom/nmap-vulners/releases) [![PayPal](https://img.shields.io/badge/donate-PayPal-green.svg)](https://paypal.me/videns)

## Description

NSE script uses info about known services to provide data on vulnerabilities. Note that it is already included into the standard nmap NSE library.

![Result example](example.png)

## Dependencies:
nmap libraries:
http
json
string
http-vulners-regex

Keep in mind that the script depends on having information about software versions, so it only works with -sV flag.

**NB:** Now it can actually be run without -sV flag if http-vulners-regex script is run as well.

## Installation
locate where your nmap scripts are located on your system
for *nix system it might be ~/.nmap/scripts/ or $NMAPDIR
for Mac it might be /usr/local/Cellar/nmap//share/nmap/scripts/
for Windows it might be C:\Program Files (x86)\Nmap\scripts
copy the provided script (vulners.nse) into that directory
run *nmap --script-updatedb* to update the nmap script DB

## Usage
Use it as straightforward as you can:
nmap -sV --script vulners [--script-args mincvss=]

It is KISS after all.

# http-vulners-regex

## Description

NSE script scans HTTP responses and identifies CPEs for the mentioned software. It can therefore boost the efficiency of the main vulners script.

![Result example](simple_regex_example.png)
Or with the paths:
![Result example](paths_regex_example.png)

## Dependencies
nmap libraries:
http
json
string
stdnse
shortport
table

## Installation
locate where nmap is located on your system
for *nix system it might be ~/.nmap/ or $NMAPDIR
for Mac it might be /usr/local/Cellar/nmap//share/nmap/
for Windows it might be C:\Program Files (x86)\Nmap\
copy the provided script (http-vulners-regex.nse) into /scripts/
copy the provided json with the regexes to /nselib/data/
copy the provided txt file with the default paths to /nselib/data/
note that you can specify your own file via command line
run *nmap --script-updatedb* to update the nmap script DB

## Usage
As a usual NSE script:
nmap --script http-vulners-regex.nse [--script-args paths={"/"}]

# vulners_enterprise

## Description
This is basically the good old faithfull nmap-vulners from above with an important exception: it requires an API_KEY to work.

Moreover it specifically uses CVSS v3 score rather than v2 in its output.

You can either specify it on the CLI using the 'api_key' script argument, set it into an envirotnment variable VULNERS_API_KEY, or store it in a file readable by the user running nmap. In this case you must specify the absolute path to the file using the 'api_key_file' script argument.

![Result example](vulners_enterprise_output.png)

## Usage
As a usual NSE script:
nmap -sV --script vulners_enterprise [--script-args mincvss=,api_key=,api_key_file=,api_host=http://my_host.com]

### NSE Arguments

**vulners_enterprise.mincvss** Limit CVEs shown to those with this CVSS score or greater.

**vulners_enterprise.api_key** API token to be used in the requests

**vulners_enterprise.api_key_file** Absolute path to the file with a single line containing the API token

**vulners_enterprise.api_host** URL to vulners API without the leading slash. Defaults to https://vulners.com