Nmap: Network Exploration and Security Auditing Cookbook - Second Edition

Nmap: Network Exploration and Security Auditing Cookbook - Second Edition

Title Page
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
13
Brute Force Password Auditing Options
17
References and Additional Reading

Enumerating PCWorx devices


PCWorx devices can be mapped on the network as they allow unauthenticated requests that return system information such as PLC type, model number, and firmware details.

This recipe shows you how to enumerate PCWorx devices with Nmap.

How to do it...

Open your terminal and enter the following Nmap command:

$ nmap -Pn -sT -p1962 --script pcworx-info <target>

The pcworx-info script will obtain device information, as shown next:

   PORT    STATE SERVICE 
   1962/tcp open  pcworx 
   | pcworx-info: 
   |   PLC Type: ILC 330 ETH 
   |   Model Number: 2737193 
   |   Firmware Version: 3.95T 
   |   Firmware Date: Mar  2 2012 
   |_  Firmware Time: 09:39:02 

 

 

How it works...

The pcworx-info script detects PCWorx devices and gathers information about the device such as type, model number, and firmware information. In the previous command, we checked TCP port 1962 (-p1962), used a full TCP connection (-sT), and disabled host discovery (-Pn) to reduce the number of custom packets...

Learn for FREE 5 days of free access
Unlimited access to the entire Packt Library from 24th - 28th July. No credit card required
Learn for FREE 5 days of free access
Unlimited access to the entire Packt Library from 24th - 28th July. No credit card required

Your notes and bookmarks