Skip to content

nmap scripts (nse files) to identify vulnerabilities

License

Notifications You must be signed in to change notification settings

Bigbublik/vicarius-nmap

 
 

Repository files navigation

vicarius-nmap

Get instant visibility into your organization’s network with a comprehensive scan that provides detailed information about the devices on the network, vulnerabilities, and more at the time of the scan.

Vicarius’ vulnerability scan is an NSE (Nmap scripting engine) used to detect vulnerabilities. It is based on vulscan - https://github.com/scipag/vulscan.

The Nmap option -sV enables version detection per service, which is used to determine flaws according to the identified product. The data is looked up in an offline CVE database that is up to date with MITRE-CVE (https://cve.mitre.org) as of November 2022.

Installation: Please copy the vicarius-vulnerability-scan.nse file into the Nmap scripts folder: \scripts\vicarius-vulnerability-scan.nse

Unzip and copy the cve.csv file into a sub-folder named vicarius-vulnerability-scan: \scripts\vicarius-vulnerability-scan\cve.csv

Usage: Run the following minimal command to initiate a simple vulnerability scan: nmap -sV --script=vicarius-vulnerability-scan.nse www.example.com

DISCLAIMER Keep in mind that this kind of derivative vulnerability scanning heavily relies on the confidence of the version detection of Nmap, the amount of documented vulnerabilities, and the accuracy of pattern matching. The existence of potential flaws is not verified with additional scanning or exploiting techniques.

For an easy process of analyzing the NMAP scan results and managing your network risk - try uploading the scan output into Topia!

topia_mock_scan (1)

About

nmap scripts (nse files) to identify vulnerabilities

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Lua 95.9%
  • Shell 4.1%