Version 2.0 of Nmap NSE Vulscan is available online. This major release introduces version identification, which may improve the accuracy of findings as long as the linked vulnerability databases provide version information (supported by scip VulDB only at the moment). Furthermore, a parsing bug if the server identification did contain special characters, has been fixed. This improves the stability of the script.
nMap Vulnerability Scanner Installation
Please install the files into the following folder of your Nmap installation:
You have to run the following minimal command to initiate a simple vulnerability scan:
nmap -sV --script=vulscan/vulscan.nse www.example.com
There are the following pre-installed databases available at the moment:
- scipvuldb.csv | http://www.scip.ch/en/?vuldb
- cve.csv | http://cve.mitre.org
- osvdb.csv | http://www.osvdb.org
- securityfocus.csv | http://www.securityfocus.com/bid/
- securitytracker.csv | http://www.securitytracker.com
- xforce.csv | http://xforce.iss.net
- expliotdb.csv | http://www.exploit-db.com
- * openvas.csv | http://www.openvas.org
Single Database Mode
You may execute scanner with the following argument to use a single database:
It is also possible to create and reference your own databases. This requires to create a database file, which has the following structure:
Just execute vulscan like you would by refering to one of the pre-delivered databases. Feel free to share your own database and vulnerability connection with me, to add it to the official repository.
The vulnerability databases are updated and assembled on a regularly basis. To support the latest disclosed vulnerabilities, keep your local vulnerability databases up-to-date.
If you want to update your databases, go to the following web site and download these files:
Copy the files into your install folder:
Keep in mind that this kind of derivative vulnerability scanning heavily relies on the confidence of the version detection of nmap, the amount of documented vulnerebilities and the accuracy of pattern matching. The existence of potential flaws is not verified with additional scanning nor exploiting techniques.