Nmap Development mailing list archives
Re: MS 08-067 and Zenmap
From: Brandon Enright <bmenrigh () ucsd edu>
Date: Mon, 1 Dec 2008 20:37:29 +0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Mon, 1 Dec 2008 12:33:00 -0500 "Pelletier, Frank" <francois.pelletier () yale edu> wrote:
Hello, are there any command scripts that can be run against a network ex., 130.132.70/24 that would report the MS08-067 vulnerable systems on these /24 networks? I have found some scripts for versions of Unix. I however use the Windows platform. I know there are various reasons for moving OS, but at this time and with the ZenMap the windows command script(s) are what is needed. Thanks Frank Pelletier ISO, ITS
This should do it for you: nmap -sCSU -p U:137,T:135,139,445 -T4 -PN -n -v --script=smb-check-vulns.nse 130.132.70.0/24 Brandon -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEARECAAYFAkk0Sw8ACgkQqaGPzAsl94L49ACfXq7GU+T1NTbPWNTWVWyzgCSv eOgAoL1XK6LOJ7+XgjOc0MzADeWOkU7S =b6N3 -----END PGP SIGNATURE----- _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- MS 08-067 and Zenmap Pelletier, Frank (Dec 01)
- Re: MS 08-067 and Zenmap Brandon Enright (Dec 01)
- <Possible follow-ups>
- Re: MS 08-067 and Zenmap Onur Akgun (Dec 02)