Nmap pcworx-info NSE Script


This page contains detailed information about how to use the pcworx-info NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/pcworx-info.nse
Script categories: discovery
Target service / protocol: pcworx, tcp
Target network port(s): 1962
List of CVEs: -

Script Description


The pcworx-info.nse script will query and parse pcworx protocol to a remote PLC. The script will send a initial request packets and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. PCWorx is a protocol and Program by Phoenix Contact.

Pcworx-info NSE Script Arguments


The pcworx-info.nse script does not have any arguments.

Pcworx-info NSE Script Example Usage


Here's an example of how to use the pcworx-info.nse script:

nmap --script pcworx-info -p 1962 <host>

Pcworx-info NSE Script Example Output


Here's a sample output from the pcworx-info.nse script:

| pcworx-info:
|   PLC Type: ILC 330 ETH
|   Model Number: 2737193
|   Firmware Version: 3.95T
|   Firmware Date: Mar  2 2012
|_  Firmware Time: 09:39:02

Pcworx-info NSE Script Example XML Output


Here's a sample XML output from the pcworx-info.nse script produced by providing the -oX <file> Nmap option:

<elem key="PLC Type">ILC 330 ETH</elem>
<elem key="Model Number">2737193</elem>
<elem key="Firmware Version">3.95T</elem>
<elem key="Firmware Date">Mar  2 2012</elem>
<elem key="Firmware Time">09:39:02</elem>

Author


  • Stephen Hilt (Digital Bond)

References


See Also


Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.