<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>http://wiki.ciscolinux.co.uk/index.php?action=history&amp;feed=atom&amp;title=Nmap</id>
	<title>Nmap - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://wiki.ciscolinux.co.uk/index.php?action=history&amp;feed=atom&amp;title=Nmap"/>
	<link rel="alternate" type="text/html" href="http://wiki.ciscolinux.co.uk/index.php?title=Nmap&amp;action=history"/>
	<updated>2026-04-05T08:07:00Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.37.2</generator>
	<entry>
		<id>http://wiki.ciscolinux.co.uk/index.php?title=Nmap&amp;diff=4556&amp;oldid=prev</id>
		<title>Pio2pio: Created page with &quot;= Install nmap = &lt;source lang=bash&gt; sudo apt install nmap &lt;/source&gt;  = Install nmap-vulners script = Clone NSE script using some well-known service to provide info on vulnerab...&quot;</title>
		<link rel="alternate" type="text/html" href="http://wiki.ciscolinux.co.uk/index.php?title=Nmap&amp;diff=4556&amp;oldid=prev"/>
		<updated>2019-08-12T22:42:31Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;= Install nmap = &amp;lt;source lang=bash&amp;gt; sudo apt install nmap &amp;lt;/source&amp;gt;  = Install nmap-vulners script = Clone NSE script using some well-known service to provide info on vulnerab...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Install nmap =&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
sudo apt install nmap&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Install nmap-vulners script =&lt;br /&gt;
Clone NSE script using some well-known service to provide info on vulnerabilities. The script depends on having software versions at hand, so it only works with -sV flag&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
# Default scripts location&lt;br /&gt;
cd /usr/share/nmap/scripts&lt;br /&gt;
git clone https://github.com/vulnersCom/nmap-vulners.git &lt;br /&gt;
&lt;br /&gt;
nmap --script nmap-vulners -sV 192.168.1.111 &amp;gt; 192.168.1.111.log&lt;br /&gt;
# -s discover service&lt;br /&gt;
# V  discover service version&lt;br /&gt;
&lt;br /&gt;
Starting Nmap 7.01 ( https://nmap.org ) at 2019-08-12 15:40 PDT&lt;br /&gt;
Nmap scan report for localhost (127.0.0.1)&lt;br /&gt;
Host is up (0.000028s latency).&lt;br /&gt;
Not shown: 998 closed ports&lt;br /&gt;
PORT    STATE SERVICE VERSION&lt;br /&gt;
22/tcp  open  ssh     OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0)&lt;br /&gt;
631/tcp open  ipp     CUPS 2.1&lt;br /&gt;
|_http-server-header: CUPS/2.1 IPP/2.1&lt;br /&gt;
| vulners: &lt;br /&gt;
|   cpe:/a:apple:cups:2.1: &lt;br /&gt;
|     	CVE-2017-18190	5	https://vulners.com/cve/CVE-2017-18190&lt;br /&gt;
|     	CVE-2018-4300	4.3	https://vulners.com/cve/CVE-2018-4300&lt;br /&gt;
|_    	CVE-2017-18248	3.5	https://vulners.com/cve/CVE-2017-18248&lt;br /&gt;
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel&lt;br /&gt;
&lt;br /&gt;
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .&lt;br /&gt;
Nmap done: 1 IP address (1 host up) scanned in 10.65 seconds&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anything with score more than 7 should be act upon.&lt;/div&gt;</summary>
		<author><name>Pio2pio</name></author>
	</entry>
</feed>