Nmap drda-info NSE Script


This page contains detailed information about how to use the drda-info NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/drda-info.nse
Script categories: safe, discovery, version
Target service / protocol: -
Target network port(s): 50000, 60000, 9090, 1526, 1527
List of CVEs: -

Script Description


The drda-info.nse script attempts to extract information from database servers supporting the DRDA protocol. The script sends a DRDA EXCSAT (exchange server attributes) command packet and parses the response.

Drda-info NSE Script Arguments


The drda-info.nse script does not have any arguments.

Drda-info NSE Script Example Usage


Here's an example of how to use the drda-info.nse script:

nmap --script=drda-info <target>

Drda-info NSE Script Example Output


Here's a sample output from the drda-info.nse script:

PORT      STATE SERVICE
50000/tcp open  drda
|  drda-info: DB2 Version: 8.02.9
|  Server Platform: QDB2/SUN
|  Instance Name:   db2inst1
|_ External Name:   db2inst1db2agent00002B430

Drda-info NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Patrik Karlsson

References


See Also


Related NSE scripts to the drda-info.nse script:

Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.