

You can find out more about these other scripts by looking them up on Nmap’s NSEDoc page. This allows you to gather information on a target by running this family of scripts at the same time by using the Nmap argument –script *-ntlm-info. I’ve also used his naming scheme instead of calling the script rdp-credssp-info or rdp-nla-info. It is important to note that no authentication is required to gather this information and no login attempts were made.įor consistency’s sake I’ve kept the output in the same format as the other *-ntlm-info scripts which were written by Justin Cacak. sudo nmap -p 3389 -script rdp-ntlm-info target_ip 3389/tcp open ms-wbt-server You can see information about the script’s usage in NSEDoc. This script is actually pretty straightforward as it doesn’t require any additional arguments. This takes a bit more work but you also end up with the other new features and bug fixes that have happened since the last release. The second option is to build from GitHub or the authoritative Subversion repo. Copy a to the nselib directory of your Nmap installation.Copy rdp.lua to the nselib directory of your Nmap installation.Copy rdp-ntlm-info.nse to the scripts directory of your Nmap installation.

The easiest way to get the required files is likely downloading them from GitHub. I recommend the latest version which is 7.70 released in March 2018. For the best results you will need a modern version of Nmap. The first option is to just copy the script into your existing Nmap installation. Until a new version of Nmap is released you will have two options for using the script. The new script has been committed to the Nmap SVN repository which is also mirrored in GitHub. This post was updated 2019.06.18 to indicate that users of 7.70 need updated nselib/a as well.
Netmap on windows update#
This post was updated 2019.06.14 to reflect that the script had been committed to the official repo, update the usage instructions to reflect this, and include the NSEDoc link for the script. 3389/tcp open ms-wbt-server Microsoft Terminal Services This post is going to talk about using a new Nmap script, rdp-ntlm-info.nse, against RDP services to discover the target’s hostname, domain name, DNS name, and version.
Netmap on windows code#
I’ve recently spent some time in various code bases working on Windows RDP related discovery.
