nmap
Nmap Pack.#
This Integration is part of theRun nmap scans with the given parameters. This integration was integrated and tested with version 7.70 of nmap. The nmap binary is shipped with the integration Docker. You can see the options available for running an nmap scan here: https://nmap.org/book/man-briefoptions.html. Some scan options require root access for using raw packet scanning techniques. See here for detailed scanning techniques. If you've configured the server to run Docker images with a non-root internal user and you want to use raw packet scanning (for example via the -sS option for SYN/ACK scan), make sure to exclude the demisto/nmap Docker image as documented here.
#
Configure nmap on Cortex XSOAR- Navigate to Settings > Integrations > Servers & Services.
- Search for nmap.
- Click Add instance to create and configure a new integration instance.
- Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
nmap-scanScan targets with the given parameters
#
Base Commandnmap-scan
#
InputArgument Name | Description | Required |
---|---|---|
targets | The targets to scan. Accepts comma-separated list. | Required |
options | The nmap options to use as documented by nmap. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
NMAP.Scan.Summary | unknown | Scan summary. |
NMAP.Scan.Version | unknown | nmap version. |
NMAP.Scan.Started | unknown | Start time epoch. |
NMAP.Scan.Ended | unknown | End time epoch. |
NMAP.Scan.CommandLine | unknown | The command line being used. |
NMAP.Scan.ScanType | unknown | The type of discovery scan. |
NMAP.Scan.Hosts.Hostname | unknown | DNS hostname of scanned host×¥ |
NMAP.Scan.Hosts.Address | unknown | Scanned host address. |
NMAP.Scan.Hosts.Status | unknown | Is the host up or down? |
NMAP.Scan.Hosts.Services.Port | unknown | The port of the service. |
NMAP.Scan.Hosts.Services.Protocol | unknown | The protocol of the service. |
NMAP.Scan.Hosts.Services.State | unknown | The state of the service. |
NMAP.Scan.Hosts.Services.Banner | unknown | Any captured banner from the service. |
NMAP.Scan.Hosts.Services.Service | unknown | The service name. |
NMAP.Scan.Hosts.ScriptResults.ID | unknown | The name of the script used. |
NMAP.Scan.Hosts.ScriptResults.Output | unknown | The raw results of the script execution. |
NMAP.Scan.Hosts.ScriptResults.Elements | unknown | Additional parseable fields from the script output. |
#
Command Example!nmap-scan options="-sV" targets=scanme.nmap.org
#
Context Example#
Human Readable Output#
Nmap done at Fri May 1 13:41:05 2020; 1 IP address (1 host up) scanned in 183.98 seconds#
Nmap scan report for scanme.nmap.org (45.33.32.156)#
Host is up.#
Services
Port Protocol State Service Banner 21 tcp open tcpwrapped 22 tcp open ssh product: OpenSSH version: 6.6.1p1 Ubuntu 2ubuntu2.13 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux 80 tcp open http product: Apache httpd version: 2.4.7 extrainfo: (Ubuntu) 1723 tcp open tcpwrapped 5060 tcp open sip 9929 tcp open nping-echo product: Nping echo 31337 tcp open tcpwrapped