Nmap smtp-strangeport NSE Script
This page contains detailed information about how to use the smtp-strangeport NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/smtp-strangeport.nse
Script categories: malware, safe
Target service / protocol: smtp, smtps, submission
Target network port(s): 25, 465, 587
List of CVEs: -
Script Description
The smtp-strangeport.nse script checks if SMTP is running on a non-standard port.
This may indicate that crackers or script kiddies have set up a backdoor on the system to send spam or control the machine.
Smtp-strangeport NSE Script Arguments
The smtp-strangeport.nse script does not have any arguments.
Smtp-strangeport NSE Script Example Usage
Here's an example of how to use the smtp-strangeport.nse script:
nmap --script=smtp-strangeport <target>
Smtp-strangeport NSE Script Example Output
Here's a sample output from the smtp-strangeport.nse script:
22/tcp open smtp
|_ smtp-strangeport: Mail server on unusual port: possible malware
Smtp-strangeport NSE Script Example XML Output
There is no sample XML output for this module. However, by providing the -oX <file>
option, Nmap will produce a XML output and save it in the file.xml
file.
Author
- Diman Todorov
References
- https://nmap.org/nsedoc/scripts/smtp-strangeport.html
- https://github.com/nmap/nmap/tree/master/scripts/smtp-strangeport.nse
See Also
Related NSE scripts to the smtp-strangeport.nse script:
- smtp-brute.nse
- smtp-commands.nse
- smtp-enum-users.nse
- smtp-ntlm-info.nse
- smtp-open-relay.nse
- smtp-vuln-cve2010-4344.nse
- smtp-vuln-cve2011-1720.nse
- smtp-vuln-cve2011-1764.nse
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.