Nmap sniffer-detect NSE Script


This page contains detailed information about how to use the sniffer-detect NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/sniffer-detect.nse
Script categories: discovery, intrusive
Target service / protocol: -
Target network port(s): -
List of CVEs: -

Script Description


The sniffer-detect.nse script checks if a target on a local Ethernet has its network card in promiscuous mode.

The techniques used are described at

Sniffer-detect NSE Script Arguments


The sniffer-detect.nse script does not have any arguments.

Sniffer-detect NSE Script Example Usage


Here's an example of how to use the sniffer-detect.nse script:

nmap --script=sniffer-detect <target>

Sniffer-detect NSE Script Example Output


Here's a sample output from the sniffer-detect.nse script:

Host script results:
|_ sniffer-detect: Likely in promiscuous mode (tests: "11111111")

Sniffer-detect NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Marek Majkowski

References


See Also


Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.