Nmap netbus-auth-bypass NSE Script
This page contains detailed information about how to use the netbus-auth-bypass NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/netbus-auth-bypass.nse
Script categories: auth, safe, vuln
Target service / protocol: netbus, tcp
Target network port(s): 12345
List of CVEs: -
Script Description
The netbus-auth-bypass.nse script checks if a NetBus server is vulnerable to an authentication bypass vulnerability which allows full access without knowing the password.
For example a server running on TCP port 12345 on localhost with this vulnerability is accessible to anyone. An attacker could simply form a connection to the server ( ncat -C 127.0.0.1 12345 ) and login to the service by typing Password;1; into the console.
Netbus-auth-bypass NSE Script Arguments
The netbus-auth-bypass.nse script does not have any arguments.
Netbus-auth-bypass NSE Script Example Usage
Here's an example of how to use the netbus-auth-bypass.nse script:
nmap -p 12345 --script netbus-auth-bypass <target>
Netbus-auth-bypass NSE Script Example Output
Here's a sample output from the netbus-auth-bypass.nse script:
12345/tcp open netbus
|_netbus-auth-bypass: Vulnerable
Netbus-auth-bypass NSE Script Example XML Output
There is no sample XML output for this module. However, by providing the -oX <file>
option, Nmap will produce a XML output and save it in the file.xml
file.
Author
- Toni Ruottu
References
- https://nmap.org/nsedoc/scripts/netbus-auth-bypass.html
- https://github.com/nmap/nmap/tree/master/scripts/netbus-auth-bypass.nse
See Also
Related NSE scripts to the netbus-auth-bypass.nse script:
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.