Vulscan is a module which enhances nmap to a vulnerability scanner. The nmap option -sV enables version detection per service which is used to determine potential flaws according to the identified product. The data is looked up in an offline version scip VulDB.
Installation
Please install the files into the following folder of your Nmap installation:
- Nmap\scripts\vulscan\*
Usage
You have to run the following minimal command to initiate a simple vulnerability scan:
- nmap -sV --script=vulscan/vulscan.nse www.example.com
Vulnerability Database
There are the following pre-installed databases available at the moment:
* scipvuldb.csv | http://www.scip.ch/en/?vuldb
* cve.csv | http://cve.mitre.org
* osvdb.csv | http://www.osvdb.org
* securityfocus.csv | http://www.securityfocus.com/bid/
* securitytracker.csv | http://www.securitytracker.com
* xforce.csv | http://xforce.iss.net
* expliotdb.csv | http://www.exploit-db.com
* openvas.csv | http://www.openvas.org
Single Database Mode
You may execute vulscan with the following argument to use a single database:
- --script-args vulscandb=your_own_database
It is also possible to create and reference your own databases. This requires to create a database file, which has the following structure:
- <id>;<title>
Just execute vulscan like you would by refering to one of the pre-delivered databases. Feel free to share your own database and vulnerability connection with me, to add it to the official repository.