Book Image

Mastering the Nmap Scripting Engine

By : Paulino Calderon
Book Image

Mastering the Nmap Scripting Engine

By: Paulino Calderon

Overview of this book

Table of Contents (23 chapters)
Mastering the Nmap Scripting Engine
Credits
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Scan Phases
Script Categories
Nmap Options Mind Map
References
Index

Chapter 10. Vulnerability Detection and Exploitation

In this chapter, my objective is to teach you about the prebuilt functions and wide range of libraries available in Nmap Scripting Engine (NSE) to exploit vulnerabilities in different applications, services, and network protocols. As with any other development framework, the main benefit is to cut down the development time when creating exploits—time that is very valuable during pen tests, especially during those dreaded short-term engagements.

All NSE exploits inherit a powerful feature—the scanning capabilities of Nmap. Script execution rules are very flexible and allow us to use host rules, port rules, and even Nmap's version detection information to spot vulnerabilities. Once you have a working NSE exploit, you can launch it against entire networks with hardly any additional effort. Your exploit will also support additional features such as parallelism, CIDR notation, different output formats, the ability to read target lists, and many...