Vulnerability Scanning
MITRE ATT&CK™ Active Scanning: Vulnerability Scanning - Technique T1595.002
Theory
We may scan victims for vulnerabilities that can be used for exploitation. Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit that we may seek to use.
Practice
We may use the Nmap Scripting Engine (NSE) to perform automated vulnerability scans. NSE scripts expand upon Nmap's core capabilities to perform a wide range of network related functions. These functions are organized into categories that revolve around specific use cases, listed here.
You can list all scripts under following directory:
For vulnerability scanning, we are mainly interested in the vuln
category. Note that each script may have several categories such as vuln
, safe
or intrusive
.
The script.db file serves as a comprehensive catalog of all accessible NSE scripts, enabling us to obtain the list of scripts falling within the vulnerability (vuln) category.
We maye use the Nmap Scripting Engine (NSE) as follow for vulnerability scanning
Resources
Last updated