Vulnerability Analysis
Nmap
Exploit Scripts
[<https://nmap.org/nsedoc/categories/exploit.html>](<https://nmap.org/nsedoc/categories/exploit.html>)Search through vulnerability scripts
cd /usr/share/nmap/scripts/ ls -l \\*vuln\\*Search through Nmap scripts for a specific keyword
ls /usr/share/nmap/scripts/\\* | grep ftpScan for vulnerable exploits with nmap
nmap --script exploit -Pn $ipNmap Auth Scripts
[<https://nmap.org/nsedoc/categories/auth.html>](<https://nmap.org/nsedoc/categories/auth.html>)Nmap Vuln Scanning
[<https://nmap.org/nsedoc/categories/vuln.html>](<https://nmap.org/nsedoc/categories/vuln.html>)Nmap DOS Scanning
nmap --script dos -Pn $ip Nmap execute DOS attack
nmap --max-parallelism 750 -Pn --script http-slowloris --script-args http-slowloris.runforever=trueScan for coldfusion web vulnerabilities
nmap -v -p 80 --script=http-vuln-cve2010-2861 $ipAnonymous FTP dump with Nmap
nmap -v -p 21 --script=ftp-anon.nse $ip-254SMB Security mode scan with Nmap
nmap -v -p 21 --script=ftp-anon.nse $ip-254Other
Search services vulnerabilities
searchsploit --exclude=dos -t apache 2.2.3msfconsole; > search apache 2.2.3nmap -v -T4 --script="*-vuln-*" $ipOpenVas
OpenVas is a powerful vulnerability scanner with thousands of scan checks.
To use OpenVas, first you must run the setup script:
openvas-setupAt the end of the setup process the automatically created password will be displayed.
After the setup port 9392 will be open and you can access OpenVas in your browser:
[<https://127.0.0.1:9392>](<https://127.0.0.1:9392>) openvasmd --create-user=username # Create new useropenvasmd --get-users # Display usersopenvasmd --user=username --new-password=password # Change user passwordopenvas-feed-update # Update OpenVas signaturesopenvas-manage-certs -V # Verify the certificates that are configured for OpenVasLast updated
Was this helpful?