How do i use the nmap scripting engine?

  • Nmap has some built-in scripts for security and discovery called Nmap Scripting Engine (NSE). You can also write your own scripts.

    Nmap documentation on NSE:

    The category and script information can be found at this link:

    From the command line you can also list them, using grep to search for the type.

    $ locate nse | grep ssl

    then using the following to get help on the script.

    $  nmap --script-help=ssl-date
    Starting Nmap 7.70 ( ) at 2018-09-17 12:14 BST
    Categories: discovery safe default
      Retrieves a target host's time and date from its TLS ServerHello response.
      In many TLS implementations, the first four bytes of server randomness
      are a Unix timestamp. The script will test whether this is indeed true
      and report the time only if it passes this test.
      Original idea by Jacob Appelbaum and his TeaTime and tlsdate tools:

    Run the scripts using the script option. The also provides examples for each script.

    $ nmap --script=ssl-date localhost

    You can run whole categories of scripts and have exclusions within them, if there's more than one category, separate them by a comma.

    If you wanted to run all the scripts that are contained in the default category.

    $ nmap --script=default localhost
    $ nmap --script=default,safe localhost

    Here are the script options used with nmap:

     --script filename|category|directory|expression[,...] .
    	   Runs a script scan using the comma-separated list of filenames, script categories, and
    	   directories. Each element in the list may also be a Boolean expression describing a more
    	   complex set of scripts. Each element is interpreted first as an expression, then as a
    	   category, and finally as a file or directory name.
    	   There are two special features for advanced users only. One is to prefix script names and
    	   expressions with + to force them to run even if they normally wouldn't (e.g. the relevant
    	   service wasn't detected on the target port). The other is that the argument all may be used
    	   to specify every script in Nmap's database. Be cautious with this because NSE contains
    	   dangerous scripts such as exploits, brute force authentication crackers, and denial of
    	   service attacks.
    	   File and directory names may be relative or absolute. Absolute names are used directly.
    	   Relative paths are looked for in the scripts of each of the following places until found:
    	   ~/.nmap (not searched on Windows).
    	   HOME\AppData\Roaming\nmap (only on Windows).
    	   the directory containing the nmap executable
    	   the directory containing the nmap executable, followed by ../share/nmap
    	   the current directory.
           When a directory name is given, Nmap loads every file in the directory whose name ends with .nse.
           All other files are ignored and directories are not searched recursively. When a filename is
           given, it does not have to have the .nse extension; it will be added automatically if necessary.
           Nmap scripts are stored in a scripts subdirectory of the Nmap data directory by default (see
   For efficiency, scripts are indexed in a database stored
           in scripts/script.db,.  which lists the category or categories in which each script belongs.
           When referring to scripts from script.db by name, you can use a shell-style ‘*’ wildcard.
           nmap --script "http-*"
    	   Loads all scripts whose name starts with http-, such as http-auth and http-open-proxy. The
    	   argument to --script had to be in quotes to protect the wildcard from the shell.
           More complicated script selection can be done using the and, or, and not operators to build
           Boolean expressions. The operators have the same precedence[12] as in Lua: not is the highest,
           followed by and and then or. You can alter precedence by using parentheses. Because expressions
           contain space characters it is necessary to quote them.
           nmap --script "not intrusive"
    	   Loads every script except for those in the intrusive category.
           nmap --script "default or safe"
    	   This is functionally equivalent to nmap --script "default,safe". It loads all scripts that
    	   are in the default category or the safe category or both.
           nmap --script "default and safe"
    	   Loads those scripts that are in both the default and safe categories.
           nmap --script "(default or safe or intrusive) and not http-*"
    	   Loads scripts in the default, safe, or intrusive categories, except for those whose names
    	   start with http-.
           --script-args n1=v1,n2={n3=v3},n4={v4,v5} .
    	   Lets you provide arguments to NSE scripts. Arguments are a comma-separated list of name=value
    	   pairs. Names and values may be strings not containing whitespace or the characters ‘{’, ‘}’,
    	   ‘=’, or ‘,’. To include one of these characters in a string, enclose the string in single or
    	   double quotes. Within a quoted string, ‘\’ escapes a quote. A backslash is only used to
    	   escape quotation marks in this special case; in all other cases a backslash is interpreted
    	   literally. Values may also be tables enclosed in {}, just as in Lua. A table may contain
    	   simple string values or more name-value pairs, including nested tables. Many scripts qualify
    	   their arguments with the script name, as in xmpp-info.server_name. You may use that full
    	   qualified version to affect just the specified script, or you may pass the unqualified
    	   version (server_name in this case) to affect all scripts using that argument name. A script
    	   will first check for its fully qualified argument name (the name specified in its
    	   documentation) before it accepts an unqualified argument name. A complex example of script
    	   arguments is --script-args
    	   'user=foo,pass=",{}=bar",whois={whodb=nofollow+ripe},xmpp-info.server_name=localhost'. The
    	   online NSE Documentation Portal at lists the arguments that each
    	   script accepts.
           --script-args-file filename .
    	   Lets you load arguments to NSE scripts from a file. Any arguments on the command line
    	   supersede ones in the file. The file can be an absolute path, or a path relative to Nmap's
    	   usual search path (NMAPDIR, etc.) Arguments can be comma-separated or newline-separated, but
    	   otherwise follow the same rules as for --script-args, without requiring special quoting and
    	   escaping, since they are not parsed by the shell.
           --script-help filename|category|directory|expression|all[,...] .
    	   Shows help about scripts. For each script matching the given specification, Nmap prints the
    	   script name, its categories, and its description. The specifications are the same as those
    	   accepted by --script; so for example if you want help about the ftp-anon script, you would
    	   run nmap --script-help ftp-anon. In addition to getting help for individual scripts, you can
    	   use this as a preview of what scripts will be run for a specification, for example with nmap
    	   --script-help default.
           --script-trace .
    	   This option does what --packet-trace does, just one ISO layer higher. If this option is
    	   specified all incoming and outgoing communication performed by a script is printed. The
    	   displayed information includes the communication protocol, the source, the target and the
    	   transmitted data. If more than 5% of all transmitted data is not printable, then the trace
    	   output is in a hex dump format. Specifying --packet-trace enables script tracing too.
           --script-updatedb .
    	   This option updates the script database found in scripts/script.db which is used by Nmap to
    	   determine the available default scripts and categories. It is only necessary to update the
    	   database if you have added or removed NSE scripts from the default scripts directory or if
    	   you have changed the categories of any script. This option is generally used by itself: nmap

Log in to reply

© Lightnetics 2019