Nmap ipidseq NSE Script
This page contains detailed information about how to use the ipidseq NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/ipidseq.nse
Script categories: safe, discovery
Target service / protocol: -
Target network port(s): -
List of CVEs: -
Script Description
The ipidseq.nse script classifies a host's IP ID sequence (test for susceptibility to idle scan).
Sends six probes to obtain IP IDs from the target and classifies them
similarly to Nmap's method. This is useful for finding suitable zombies
for Nmap's idle scan (-sI
) as Nmap itself doesn't provide a way to scan
for these hosts.
Ipidseq NSE Script Arguments
This is a full list of arguments supported by the ipidseq.nse script:
probeportSet destination port to probe
- - -
To use this script argument, add it to Nmap command line like in this example:
nmap --script=ipidseq --script-args probeport=value <target>
Ipidseq NSE Script Example Usage
Here's an example of how to use the ipidseq.nse script:
nmap --script ipidseq [--script-args probeport=port] target
Ipidseq NSE Script Example Output
Here's a sample output from the ipidseq.nse script:
Host script results:
|_ipidseq: Incremental! [used port 80]
Ipidseq NSE Script Example XML Output
There is no sample XML output for this module. However, by providing the -oX <file>
option, Nmap will produce a XML output and save it in the file.xml
file.
Author
- Kris Katterjohn
References
- https://nmap.org/nsedoc/scripts/ipidseq.html
- https://github.com/nmap/nmap/tree/master/scripts/ipidseq.nse
See Also
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.