Nmap pcworx-info NSE Script
This page contains detailed information about how to use the pcworx-info NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/pcworx-info.nse
Script categories: discovery
Target service / protocol: pcworx, tcp
Target network port(s): 1962
List of CVEs: -
Script Description
The pcworx-info.nse script will query and parse pcworx protocol to a remote PLC. The script will send a initial request packets and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. PCWorx is a protocol and Program by Phoenix Contact.
Pcworx-info NSE Script Arguments
The pcworx-info.nse script does not have any arguments.
Pcworx-info NSE Script Example Usage
Here's an example of how to use the pcworx-info.nse script:
nmap --script pcworx-info -p 1962 <host>
Pcworx-info NSE Script Example Output
Here's a sample output from the pcworx-info.nse script:
| pcworx-info:
| PLC Type: ILC 330 ETH
| Model Number: 2737193
| Firmware Version: 3.95T
| Firmware Date: Mar 2 2012
|_ Firmware Time: 09:39:02
Pcworx-info NSE Script Example XML Output
Here's a sample XML output from the pcworx-info.nse script produced by providing the -oX <file>
Nmap option:
<elem key="PLC Type">ILC 330 ETH</elem>
<elem key="Model Number">2737193</elem>
<elem key="Firmware Version">3.95T</elem>
<elem key="Firmware Date">Mar 2 2012</elem>
<elem key="Firmware Time">09:39:02</elem>
Author
- Stephen Hilt (Digital Bond)
References
- https://nmap.org/nsedoc/scripts/pcworx-info.html
- https://github.com/nmap/nmap/tree/master/scripts/pcworx-info.nse
- http://digitalbond.com
See Also
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.