Nmap Development mailing list archives

Re: MS 08-067 and Zenmap


From: Brandon Enright <bmenrigh () ucsd edu>
Date: Mon, 1 Dec 2008 20:37:29 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Mon, 1 Dec 2008 12:33:00 -0500
"Pelletier, Frank" <francois.pelletier () yale edu> wrote:

Hello, are there any command scripts that can be run against a
network ex., 130.132.70/24 that would report the MS08-067 vulnerable
systems on these /24 networks?

I have found some scripts for versions of Unix. I however use the
Windows platform.  I know there are various reasons for moving OS,
but at this time and with the ZenMap the windows command script(s)
are what is needed.

Thanks
Frank Pelletier
ISO, ITS


This should do it for you:

nmap -sCSU -p U:137,T:135,139,445 -T4 -PN -n -v --script=smb-check-vulns.nse 130.132.70.0/24

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkk0Sw8ACgkQqaGPzAsl94L49ACfXq7GU+T1NTbPWNTWVWyzgCSv
eOgAoL1XK6LOJ7+XgjOc0MzADeWOkU7S
=b6N3
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: