Vulnerability Scanning
MITRE ATT&CK™ Active Scanning: Vulnerability Scanning - Technique T1595.002
Last updated
Was this helpful?
MITRE ATT&CK™ Active Scanning: Vulnerability Scanning - Technique T1595.002
Last updated
Was this helpful?
We may scan victims for vulnerabilities that can be used for exploitation. Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit that we may seek to use.
We may use the to perform automated vulnerability scans. NSE scripts expand upon Nmap's core capabilities to perform a wide range of network related functions. These functions are organized into categories that revolve around specific use cases, .
You can list all scripts under following directory:
For vulnerability scanning, we are mainly interested in the vuln
category. Note that each script may have several categories such as vuln
, safe
or intrusive
.
We maye use the Nmap Scripting Engine (NSE) as follow for vulnerability scanning