Run nmap scans with the given parameters. This integration was integrated and tested with version 7.70 of nmap. The nmap binary is shipped with the integration Docker. You can see the options available for running an nmap scan here: https://nmap.org/book/man-briefoptions.html. Some scan options require root access for using raw packet scanning techniques. See here for detailed scanning techniques. If you've configured the server to run Docker images with a non-root internal user and you want to use raw packet scanning (for example via the -sS option for SYN/ACK scan), make sure to exclude the demisto/nmap Docker image as documented here.
- Navigate to Settings > Integrations > Servers & Services.
- Search for nmap.
- Click Add instance to create and configure a new integration instance.
- Click Test to validate the URLs, token, and connection.
You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
Scan targets with the given parameters
|targets||The targets to scan. Accepts comma-separated list.||Required|
|options||The nmap options to use as documented by nmap.||Required|
|NMAP.Scan.Started||unknown||Start time epoch.|
|NMAP.Scan.Ended||unknown||End time epoch.|
|NMAP.Scan.CommandLine||unknown||The command line being used.|
|NMAP.Scan.ScanType||unknown||The type of discovery scan.|
|NMAP.Scan.Hosts.Hostname||unknown||DNS hostname of scanned hostץ|
|NMAP.Scan.Hosts.Address||unknown||Scanned host address.|
|NMAP.Scan.Hosts.Status||unknown||Is the host up or down?|
|NMAP.Scan.Hosts.Services.Port||unknown||The port of the service.|
|NMAP.Scan.Hosts.Services.Protocol||unknown||The protocol of the service.|
|NMAP.Scan.Hosts.Services.State||unknown||The state of the service.|
|NMAP.Scan.Hosts.Services.Banner||unknown||Any captured banner from the service.|
|NMAP.Scan.Hosts.Services.Service||unknown||The service name.|
|NMAP.Scan.Hosts.ScriptResults.ID||unknown||The name of the script used.|
|NMAP.Scan.Hosts.ScriptResults.Output||unknown||The raw results of the script execution.|
|NMAP.Scan.Hosts.ScriptResults.Elements||unknown||Additional parseable fields from the script output.|
!nmap-scan options="-sV" targets=scanme.nmap.org
Port Protocol State Service Banner 21 tcp open tcpwrapped 22 tcp open ssh product: OpenSSH version: 6.6.1p1 Ubuntu 2ubuntu2.13 extrainfo: Ubuntu Linux; protocol 2.0 ostype: Linux 80 tcp open http product: Apache httpd version: 2.4.7 extrainfo: (Ubuntu) 1723 tcp open tcpwrapped 5060 tcp open sip 9929 tcp open nping-echo product: Nping echo 31337 tcp open tcpwrapped