Nmap ipidseq NSE Script


This page contains detailed information about how to use the ipidseq NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/ipidseq.nse
Script categories: safe, discovery
Target service / protocol: -
Target network port(s): -
List of CVEs: -

Script Description


The ipidseq.nse script classifies a host's IP ID sequence (test for susceptibility to idle scan).

Sends six probes to obtain IP IDs from the target and classifies them similarly to Nmap's method. This is useful for finding suitable zombies for Nmap's idle scan (-sI) as Nmap itself doesn't provide a way to scan for these hosts.

Ipidseq NSE Script Arguments


This is a full list of arguments supported by the ipidseq.nse script:

probeport

Set destination port to probe

- - -
To use this script argument, add it to Nmap command line like in this example:

nmap --script=ipidseq --script-args probeport=value <target>

Ipidseq NSE Script Example Usage


Here's an example of how to use the ipidseq.nse script:

nmap --script ipidseq [--script-args probeport=port] target

Ipidseq NSE Script Example Output


Here's a sample output from the ipidseq.nse script:

Host script results:
|_ipidseq: Incremental! [used port 80]

Ipidseq NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Kris Katterjohn

References


See Also


Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.