Nmap broadcast-ataoe-discover NSE Script


This page contains detailed information about how to use the broadcast-ataoe-discover NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Select:
Overview
Error Messages

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/broadcast-ataoe-discover.nse
Script categories: broadcast, safe
Target service / protocol: -
Target network port(s): -
List of CVEs: -

Script Description


The broadcast-ataoe-discover.nse script discovers servers supporting the ATA over Ethernet protocol. ATA over Ethernet is an ethernet protocol developed by the Brantley Coile Company and allows for simple, high-performance access to SATA drives over Ethernet.

Discovery is performed by sending a Query Config Request to the Ethernet broadcast address with all bits set in the major and minor fields of the header.

Broadcast-ataoe-discover NSE Script Arguments


The broadcast-ataoe-discover.nse script does not have any arguments.

Broadcast-ataoe-discover NSE Script Example Usage


Here's an example of how to use the broadcast-ataoe-discover.nse script:

nmap --script broadcast-ataoe-discover -e <interface>

Broadcast-ataoe-discover NSE Script Example Output


Here's a sample output from the broadcast-ataoe-discover.nse script:

Pre-scan script results:
| broadcast-ataoe-discover:
|_  Server: 08:00:27:12:34:56; Version: 1; Major: 0; Minor: 1

Broadcast-ataoe-discover NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Patrik Karlsson

References


See Also


Related NSE scripts to the broadcast-ataoe-discover.nse script:

Visit Nmap NSE Library for more scripts.

The broadcast-ataoe-discover.nse script may fail with the following error messages. Check for the possible causes by using the code snippets highlighted below found in the script source code. This can often times help in identifying the root cause of the problem.

Failed to retrieve interface information


Here is a relevant code snippet related to the "Failed to retrieve interface information" error message:

129:	    return
130:	  end
131:	
132:	  local iface = nmap.get_interface_info(iname)
133:	  if ( not(iface) ) then
134:	    return stdnse.format_output(false, "Failed to retrieve interface information")
135:	  end
136:	
137:	  local pcap = nmap.new_socket()
138:	  pcap:set_timeout(5000)
139:	  pcap:pcap_open(iface.device, 1500, true, "ether proto 0x88a2 && !ether src " .. stdnse.format_mac(iface.mac))

Version


This page has been created based on Nmap version 7.92.

Go back to menu.