Nmap-Vulners is a script that searches for your target’s vulnerabilities. Nmap produces the targets running versions and services. Nmap-Vulners then takes your targets running services and versions and runs them against known CVE’s from multiple databases such as OpenVAS (Nessus), Exploit-DB, MITRE CVE, OSVDB, SecurityFocus, SecurityTracker, IBM X-Force. It then produces all CVE’s based on your targets running services and versions.
- Install Nmap-Vulners
-
cd /usr/share/nmap/scripts/
-
git clone https://github.com/vulnersCom/nmap-vulners.git
- Using Nmap with Nmap-Vulners Script
-
nmap --script nmap-vulners -sV IP
Additionally you can specify port -
nmap --script nmap-vulners -sV -pPORT IP
Or search the target URL nmap --script nmap-vulners -sV www.TargetUrl.com
- Here is an example of how it works.
-
nmap --script nmap-vulners -sV www.vulnweb.com
Starting Nmap 7.70 ( https://nmap.org ) at 2019-04-06 19:08 PDT Nmap scan report for www.vulnweb.com (176.28.50.165)Host is up (0.28s latency).rDNS record for 176.28.50.165: rs202995.rs.hosteurope.de Not shown: 988 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp ProFTPD 1.3.3e | vulners: | cpe:/a:proftpd:proftpd:1.3.3e:
|_ CVE-2011-4130 9.0 https://vulners.com/cve/CVE-2011-4130
22/tcp open ssh OpenSSH 5.3p1 Debian 3ubuntu7.1 (Ubuntu Linux; protocol 2.0)
| vulners:
| cpe:/a:openbsd:openssh:5.3p1:
| CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
| CVE-2018-15473 5.0 https://vulners.com/cve/CVE-2018-15473
|_ CVE-2016-0777 4.0 https://vulners.com/cve/CVE-2016-0777
25/tcp filtered smtp
53/tcp open domain (unknown banner: none)
| fingerprint-strings:
| DNSVersionBindReqTCP:
| version
| bind
|_ none
80/tcp open http nginx 1.4.1
|_http-server-header: nginx/1.4.1
106/tcp open pop3pw poppassd
110/tcp open pop3 Courier pop3d
143/tcp open imap Plesk Courier imapd
465/tcp open ssl/smtps?
993/tcp open ssl/imaps?
995/tcp open ssl/pop3s?
8443/tcp open http lighttpd
|_http-server-header: sw-cp-server