Nmap fox-info NSE Script
This page contains detailed information about how to use the fox-info NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Select: |
---|
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/fox-info.nse
Script categories: discovery, version
Target service / protocol: niagara-fox, tcp
Target network port(s): 1911, 4911
List of CVEs: -
Script Description
Tridium Niagara Fox is a protocol used within Building Automation Systems. Based off Billy Rios and Terry McCorkle's work this Nmap NSE will collect information from A Tridium Niagara system.
Fox-info NSE Script Arguments
The fox-info.nse script does not have any arguments.
Fox-info NSE Script Example Usage
Here's an example of how to use the fox-info.nse script:
nmap --script fox-info.nse -p 1911 <host>
Fox-info NSE Script Example Output
Here's a sample output from the fox-info.nse script:
1911/tcp open Niagara Fox
| fox-info:
| fox.version: 1.0.1
| hostName: xpvm-0omdc01xmy
| hostAddress: 192.168.1.1
| app.name: Workbench
| app.version: 3.7.44
| vm.name: Java HotSpot(TM) Server VM
| vm.version: 20.4-b02
| os.name: Windows XP
| timeZone: America/Chicago
| hostId: Win-99CB-D49D-5442-07BB
| vmUuid: 8b530bc8-76c5-4139-a2ea-0fabd394d305
|_ brandId: vykon
Fox-info NSE Script Example XML Output
Here's a sample XML output from the fox-info.nse script produced by providing the -oX <file>
Nmap option:
<elem key="fox.version">1.0.1</elem>
<elem key="hostName">xpvm-0omdc01xmy</elem>
<elem key="hostAddress">192.168.1.1</elem>
<elem key="app.name">Workbench</elem>
<elem key="app.version">3.7.44</elem>
<elem key="vm.name">Java HotSpot(TM) Server VM</elem>
<elem key="vm.version">20.4-b02</elem>
<elem key="os.Name">Windows XP</elem>
<elem key="timeZone">America/Chicago</elem>
<elem key="hostId">Win-99CB-D49D-5442-07BB</elem>
<elem key="vmUuid">8b530bc8-76c5-4139-a2ea-0fabd394d305</elem>
<elem key="brandId">vykon</elem>
Author
- Stephen Hilt (Digital Bond)
References
- https://nmap.org/nsedoc/scripts/fox-info.html
- https://github.com/nmap/nmap/tree/master/scripts/fox-info.nse
- http://digitalbond.com
See Also
Visit Nmap NSE Library for more scripts.
The fox-info.nse script may fail with the following error messages. Check for the possible causes by using the code snippets highlighted below found in the script source code. This can often times help in identifying the root cause of the problem.
Receive error: %s
Here is a relevant code snippet related to the "Receive error: %s" error message:
72: ]==]
73:
74: -- receive response
75: local socket, response, proto = comm.tryssl(host, port, orig_query)
76: if not socket then
77: stdnse.debug1( "Receive error: %s", response)
78: return nil
79: end
80: socket:close()
81:
82: if proto == "ssl" then
Version
This page has been created based on Nmap version 7.92.
Go back to menu.