Skip to main content
  1. All Posts/

vscan

Tools Shell

vscan

vulnerability scanner tool is using nmap and nse scripts to find vulnerabilities
This tool puts an additional value into vulnerability scanning with nmap.
It uses NSE scripts which can add flexibility in terms of vulnerability detection and exploitation.
Below there are some of the features that NSE scripts provide

  • Network discovery
  • More sophisticated version detection
  • Vulnerability detection
  • Backdoor detection
  • Vulnerability exploitation

This tool uses the path /usr/share/nmap/scripts/ where the nse scripts are located in kali linux
The tool performs the following

  • check the communication to the target hosts by cheking icmp requests
  • takes as input a protocol name such as http and executes all nse scripts related to that protocol
  • if any vulnerability triggers it saves the output into a log file
  • it may perform all of the above actions for a range of IP addresses

If the tool finds a vulnerabilty in a certain protocol (e.g http) it keeps the output into a log file which is created and saved in the following location /home/vulnerabilities_enumeration/http_vulnerabilities/http_vulnerabilities/http_vulnerabilities.txt
In this example the folders have been created using the protocol prefix which in the current occasion is the http protocol.

Usage:

[Usage:] ./vscan.sh <ip_range> <protocol> <port> <Pn (optional)>
[Usage:] ./vscan.sh <ips_file> <protocol> <port> <Pn (optional)>
[Usage:] ./vscan.sh <ip> <protocol> <port> <Pn (optional)>

How to run:

./vscan.sh 192.168.162.90 http 80

<ol start="2" dir="auto">
  <li>
    </ol> <p>
      <code>./vscan.sh 192.168.162.10-90 http 80</code>
    </p>
    
    <ol start="3" dir="auto">
      <li>
        </ol> <p>
          <code>./vscan.sh 192.168.162.90 ssh 22 Pn</code>
        </p>
        
        <ol start="4" dir="auto">
          <li>
            </ol> <p>
              <code>./vscan.sh IPs.txt smb 445 </code>
            </p>
            
            <h3 dir="auto">
              <a rel="nofollow noopener" target="_blank" id="user-content-references-" class="anchor" aria-hidden="true" href="#references-"></a>References :
            </h3>
            
            <ul dir="auto">
              <li>
                <a rel="nofollow noopener" target="_blank" href="https://nmap.org/book/nse.html">https://nmap.org/book/nse.html</a>
              </li>
              <li>
                <a rel="nofollow noopener" target="_blank" href="https://nmap.org/nsedoc/">https://nmap.org/nsedoc/</a>
              </li>
            </ul>
            
            <h3 dir="auto">
              <a rel="nofollow noopener" target="_blank" id="user-content-screenshots" class="anchor" aria-hidden="true" href="#screenshots"></a>Screenshots:
            </h3>
            
            <h3 dir="auto">
              <a rel="nofollow noopener" target="_blank" id="user-content-example-smb-scanning" class="anchor" aria-hidden="true" href="#example-smb-scanning"></a>Example: SMB scanning
            </h3>
            
            <p>
              <a rel="nofollow noopener" target="_blank" href="https://cloud.githubusercontent.com/assets/12726776/12111385/820089b6-b39d-11e5-9664-ab8f4c0ae417.PNG"></a>
            </p>
            
            <h3 dir="auto">
              <a rel="nofollow noopener" target="_blank" id="user-content-example-slowloris-vulnerability-detection" class="anchor" aria-hidden="true" href="#example-slowloris-vulnerability-detection"></a>Example: Slowloris vulnerability detection
            </h3>
            
            <p>
              <a rel="nofollow noopener" target="_blank" href="https://cloud.githubusercontent.com/assets/12726776/12113240/28be284c-b3aa-11e5-99f6-faa19a9ba00f.PNG"></a>
            </p>
            
            <h3 dir="auto">
              <a rel="nofollow noopener" target="_blank" id="user-content-example-multiple-ip-scanning-ssh-weak-keys" class="anchor" aria-hidden="true" href="#example-multiple-ip-scanning-ssh-weak-keys"></a>Example: multiple IP scanning SSH weak keys
            </h3>
            
            <p>
              <a rel="nofollow noopener" target="_blank" href="https://cloud.githubusercontent.com/assets/12726776/12118359/b1619c32-b3ce-11e5-862c-cc5a85b667d1.PNG"></a>
            </p>
            
            <h3 dir="auto">
              <a rel="nofollow noopener" target="_blank" id="user-content-example-when-the-system-is-down-or-no-icmp-requests" class="anchor" aria-hidden="true" href="#example-when-the-system-is-down-or-no-icmp-requests"></a>Example: When the system is down or no ICMP requests
            </h3>
            
            <p>
              <a rel="nofollow noopener" target="_blank" href="https://cloud.githubusercontent.com/assets/12726776/12119140/96a23aa6-b3d2-11e5-9348-363ff54700d9.PNG"></a>
            </p>