Nmap netbus-auth-bypass NSE Script


This page contains detailed information about how to use the netbus-auth-bypass NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/netbus-auth-bypass.nse
Script categories: auth, safe, vuln
Target service / protocol: netbus, tcp
Target network port(s): 12345
List of CVEs: -

Script Description


The netbus-auth-bypass.nse script checks if a NetBus server is vulnerable to an authentication bypass vulnerability which allows full access without knowing the password.

For example a server running on TCP port 12345 on localhost with this vulnerability is accessible to anyone. An attacker could simply form a connection to the server ( ncat -C 127.0.0.1 12345 ) and login to the service by typing Password;1; into the console.

Netbus-auth-bypass NSE Script Arguments


The netbus-auth-bypass.nse script does not have any arguments.

Netbus-auth-bypass NSE Script Example Usage


Here's an example of how to use the netbus-auth-bypass.nse script:

nmap -p 12345 --script netbus-auth-bypass <target>

Netbus-auth-bypass NSE Script Example Output


Here's a sample output from the netbus-auth-bypass.nse script:

12345/tcp open  netbus
|_netbus-auth-bypass: Vulnerable

Netbus-auth-bypass NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Toni Ruottu

References


See Also


Related NSE scripts to the netbus-auth-bypass.nse script:

Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.