Nmap drda-info NSE Script
This page contains detailed information about how to use the drda-info NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/drda-info.nse
Script categories: safe, discovery, version
Target service / protocol: -
Target network port(s): 50000, 60000, 9090, 1526, 1527
List of CVEs: -
Script Description
The drda-info.nse script attempts to extract information from database servers supporting the DRDA protocol. The script sends a DRDA EXCSAT (exchange server attributes) command packet and parses the response.
Drda-info NSE Script Arguments
The drda-info.nse script does not have any arguments.
Drda-info NSE Script Example Usage
Here's an example of how to use the drda-info.nse script:
nmap --script=drda-info <target>
Drda-info NSE Script Example Output
Here's a sample output from the drda-info.nse script:
PORT STATE SERVICE
50000/tcp open drda
| drda-info: DB2 Version: 8.02.9
| Server Platform: QDB2/SUN
| Instance Name: db2inst1
|_ External Name: db2inst1db2agent00002B430
Drda-info NSE Script Example XML Output
There is no sample XML output for this module. However, by providing the -oX <file>
option, Nmap will produce a XML output and save it in the file.xml
file.
Author
- Patrik Karlsson
References
- https://nmap.org/nsedoc/scripts/drda-info.html
- https://github.com/nmap/nmap/tree/master/scripts/drda-info.nse
See Also
Related NSE scripts to the drda-info.nse script:
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.