Nmap Development mailing list archives
Re: MS 08-067 and Zenmap
From: "Onur Akgun" <fincan () gmail com>
Date: Tue, 2 Dec 2008 10:37:40 -0500
Just a quick reminder; that script is not in the latest stable, you have to pull it from SVN and compile it. More info about SVN repository is at: http://nmap.org/book/install.html#inst-svn Onur
------------------------------ Date: Mon, 1 Dec 2008 20:37:29 +0000 From: Brandon Enright <bmenrigh () ucsd edu> Subject: Re: MS 08-067 and Zenmap To: "Pelletier, Frank" <francois.pelletier () yale edu> Cc: "nmap-dev () insecure org" <nmap-dev () insecure org>, bmenrigh () ucsd edu Message-ID: <20081201203729.3c3d858a@gamma> Content-Type: text/plain; charset=US-ASCII -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Mon, 1 Dec 2008 12:33:00 -0500 "Pelletier, Frank" <francois.pelletier () yale edu> wrote:Hello, are there any command scripts that can be run against a network ex., 130.132.70/24 that would report the MS08-067 vulnerable systems on these /24 networks? I have found some scripts for versions of Unix. I however use the Windows platform. I know there are various reasons for moving OS, but at this time and with the ZenMap the windows command script(s) are what is needed. Thanks Frank Pelletier ISO, ITSThis should do it for you: nmap -sCSU -p U:137,T:135,139,445 -T4 -PN -n -v --script=smb-check-vulns.nse 130.132.70.0/24 Brandon -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEARECAAYFAkk0Sw8ACgkQqaGPzAsl94L49ACfXq7GU+T1NTbPWNTWVWyzgCSv eOgAoL1XK6LOJ7+XgjOc0MzADeWOkU7S =b6N3 -----END PGP SIGNATURE-----
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- MS 08-067 and Zenmap Pelletier, Frank (Dec 01)
- Re: MS 08-067 and Zenmap Brandon Enright (Dec 01)
- <Possible follow-ups>
- Re: MS 08-067 and Zenmap Onur Akgun (Dec 02)