• Stars
    star
    157
  • Rank 238,399 (Top 5 %)
  • Language
    Lua
  • Created over 4 years ago
  • Updated over 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473

Contains Custom NSE scripts

CVE-2020-0796

NSE script to detect vulnerable CVE-2020-0796 issue, with Microsoft SMBv3 Compression (aka coronablue, SMBGhost)

The script is a modified version of smb-protocols.nse script with a modified output data for v3.11 detection and validating CVE-2020-0796.

Note: This script just safe checks for CVE-2020-0796 vulnerability on SMBv3 and doesn't attempt anything beyond that.

Installation and running

Copy the .nse file to nmap/scripts/ folder and run update

cp cve-2020-0796.nse /usr/share/nmap/scripts/

nmap --script-updatedb

Run as

nmap -p445 --script cve-2020-0796 <<target>>

-- @output
-- | smb-protocols:
-- | dialects:
-- | NT LM 0.12 (SMBv1) [dangerous, but default]
-- | 2.02
-- | 2.10
-- | 3.00
-- | 3.02
-- |_ 3.11 (SMBv3.11) LZNT1 compression algorithm - Vulnerable to CVE-2020-0796 SMBGhost

Checks for compression based on https://github.com/ollypwn/SMBGhost/ Could've been done utilizing smb.lua in the nselib but it required substantial editing of the functions, went with sockets.

CVE-2020-1350

NSE script to detect vulnerable CVE-2020-1350 issue, with Microsoft DNS server (aka SIGRed)

The script utilizes code components of dns-nsid.nse script with checks for CVE-2020-1350

Note: This script just safe checks for CVE-2020-1350 vulnerability on Microsoft DNS Servers for identification purposes only and doesn't attempt anything beyond that. This script is not perfect and depends on the output of dig CH TXT bind.version @target and fails when DNS version number is hidden

Installation and running

Copy the .nse file to nmap/scripts/ folder and run update

cp cve-2020-1350.nse /usr/share/nmap/scripts/

nmap --script-updatedb

Run as

sudo nmap -sSU -p53 --script cve-2020-1350 <<target>>

sudo nmap -sSU -p53 --script cve-2020-1350 <<target>> --script-args output=<outputfile.txt>

http-custom-title

NSE Script to search for custom HTTP titles provided as script arguments. This script helps in searching and providing only results of HTTP titles required.

Installation and running

Copy the .nse file to nmap/scripts/ folder and run update

cp http-custom-title.nse /usr/share/nmap/scripts/

nmap --script-updatedb

Run as

nmap --script ./http-custom-title.nse -p80 scanme.nmap.org --script-args customtitle='ScanMe'

nmap --script ./http-custom-title.nse <<target>> --script-args customtitle='Apache'

vCenter RCE CVE-2021-21972 check

For checking against CVE-2021-21972, CVE-2021-21973 Vulnerability in vCenter. The script also additionally prints the vSphere Version and Build Number

Copy the .nse file to nmap/scripts/ folder and run update

cp cve-2021-21972.nse /usr/share/nmap/scripts/

nmap --script-updatedb

Run as

nmap --script cve-2021-21972.nse -p443 <host> (optional: --script-args output=report.txt)