Nmap sniffer-detect NSE Script
This page contains detailed information about how to use the sniffer-detect NSE script. For list of all NSE scripts, visit the Nmap NSE Library.
Script Overview
Script source code: https://github.com/nmap/nmap/tree/master/scripts/sniffer-detect.nse
Script categories: discovery, intrusive
Target service / protocol: -
Target network port(s): -
List of CVEs: -
Script Description
The sniffer-detect.nse script checks if a target on a local Ethernet has its network card in promiscuous mode.
The techniques used are described at
Sniffer-detect NSE Script Arguments
The sniffer-detect.nse script does not have any arguments.
Sniffer-detect NSE Script Example Usage
Here's an example of how to use the sniffer-detect.nse script:
nmap --script=sniffer-detect <target>
Sniffer-detect NSE Script Example Output
Here's a sample output from the sniffer-detect.nse script:
Host script results:
|_ sniffer-detect: Likely in promiscuous mode (tests: "11111111")
Sniffer-detect NSE Script Example XML Output
There is no sample XML output for this module. However, by providing the -oX <file>
option, Nmap will produce a XML output and save it in the file.xml
file.
Author
- Marek Majkowski
References
- https://nmap.org/nsedoc/scripts/sniffer-detect.html
- https://github.com/nmap/nmap/tree/master/scripts/sniffer-detect.nse
- http://www.securityfriday.com/promiscuous_detection_01.pdf
See Also
Visit Nmap NSE Library for more scripts.
Version
This page has been created based on Nmap version 7.92.