Nmap smtp-strangeport NSE Script


This page contains detailed information about how to use the smtp-strangeport NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/smtp-strangeport.nse
Script categories: malware, safe
Target service / protocol: smtp, smtps, submission
Target network port(s): 25, 465, 587
List of CVEs: -

Script Description


The smtp-strangeport.nse script checks if SMTP is running on a non-standard port.

This may indicate that crackers or script kiddies have set up a backdoor on the system to send spam or control the machine.

Smtp-strangeport NSE Script Arguments


The smtp-strangeport.nse script does not have any arguments.

Smtp-strangeport NSE Script Example Usage


Here's an example of how to use the smtp-strangeport.nse script:

nmap --script=smtp-strangeport <target>

Smtp-strangeport NSE Script Example Output


Here's a sample output from the smtp-strangeport.nse script:

22/tcp  open   smtp
|_ smtp-strangeport: Mail server on unusual port: possible malware

Smtp-strangeport NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Diman Todorov

References


See Also


Related NSE scripts to the smtp-strangeport.nse script:

Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.