Nmap afp-serverinfo NSE Script


This page contains detailed information about how to use the afp-serverinfo NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/afp-serverinfo.nse
Script categories: default, discovery, safe
Target service / protocol: afp
Target network port(s): 548
List of CVEs: -

Script Description


The afp-serverinfo.nse script shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type (for example Macmini or MacBookPro).

Afp-serverinfo NSE Script Arguments


This is a full list of arguments supported by the afp-serverinfo.nse script:

afp.password

The password to use for authentication.

afp.username

The username to use for authentication.

- - -
To use these script arguments, add them to the Nmap command line using the --script-args arg1=value,[arg2=value,..] syntax. For example:

nmap --script=afp-serverinfo --script-args afp.password=value,afp.username=value <target>

Afp-serverinfo NSE Script Example Usage


Here's an example of how to use the afp-serverinfo.nse script:

nmap --script=afp-serverinfo <target>

Afp-serverinfo NSE Script Example Output


Here's a sample output from the afp-serverinfo.nse script:

PORT    STATE SERVICE
548/tcp open  afp
| afp-serverinfo:
|   Server Flags:
|     Flags hex: 0x837d
|     Super Client: true
|     UUIDs: false
|     UTF8 Server Name: true
|     Open Directory: true
|     Reconnect: false
|     Server Notifications: true
|     TCP/IP: true
|     Server Signature: true
|     Server Messages: true
|     Password Saving Prohibited: true
|     Password Changing: false
|     Copy File: true
|   Server Name: foobardigital
|   Machine Type: Netatalk
|   AFP Versions: AFPVersion 1.1, AFPVersion 2.0, AFPVersion 2.1, AFP2.2, AFPX03, AFP3.1
|   UAMs: DHX2
|   Server Signature: bbeb480e00000000bbeb480e00000000
|   Network Addresses:
|     192.0.2.235
|     foobardigital.com
|_  UTF8 Server Name: foobardigital

Afp-serverinfo NSE Script Example XML Output


Here's a sample XML output from the afp-serverinfo.nse script produced by providing the -oX <file> Nmap option:

 <table key="Server Flags">
   <elem key="Flags hex">0x837d</elem>
   <elem key="Super Client">true</elem>
   <elem key="UUIDs">false</elem>
   <elem key="UTF8 Server Name">true</elem>
   <elem key="Open Directory">true</elem>
   <elem key="Reconnect">false</elem>
   <elem key="Server Notifications">true</elem>
   <elem key="TCP/IP">true</elem>
   <elem key="Server Signature">true</elem>
   <elem key="Server Messages">true</elem>
   <elem key="Password Saving Prohibited">true</elem>
   <elem key="Password Changing">false</elem>
   <elem key="Copy File">true</elem>
 </table>
 <elem key="Server Name">foobardigital</elem>
 <elem key="Machine Type">Netatalk</elem>
 <table key="AFP Versions">
   <elem>AFPVersion 1.1</elem>
   <elem>AFPVersion 2.0</elem>
   <elem>AFPVersion 2.1</elem>
   <elem>AFP2.2</elem>
   <elem>AFPX03</elem>
   <elem>AFP3.1</elem>
 </table>
 <table key="UAMs">
   <elem>DHX2</elem>
 </table>
 <elem key="Server Signature">
 bbeb480e00000000bbeb480e00000000</elem>
 <table key="Network Addresses">
   <elem>192.0.2.235</elem>
   <elem>foobardigital.com</elem>
 </table>
 <elem key="UTF8 Server Name">foobardigital</elem>

Author


  • Andrew Orr

References


See Also


Related NSE scripts to the afp-serverinfo.nse script:

Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.