Welcome to the end map scripting engine vulnerability. Scanning an exploitation lesson In previous lessons, we've covered various aspects of map scripting engine. I've shown you how to perform a couple scrips, scans and get help information about scripts from both the command line and INS and map.
This lesson will go over some of that stuff, but we'll focus on the use of NSC for vulnerability, scanning and target exploitation. The truth is, NSC could be an entire training Siris on its own, so this lesson will focus on giving you the tools to get started. Here are the learning objectives for this lesson.
First will briefly answer the questions. What is the end map scripting engine and how does it work?
We'll examine how n map scripting engine gives us the ability to perform advanced scanning.
Then we'll go through a lab that demonstrates its use as a vulnerability scanner and exploitation tool.
So what is the end map scripting engine? Well, up into this point, many of the features and functions that we've learned about N map basically require you to execute one commanded a time,
then gather the results, which generally leads to more and more single commands for further investigation.
One of the neat things that NSC allows us to do is write out a series of commands in the form of a script that could be dependent and related to one another in such a way that our time could be much more better focused on analyzing the results instead of on typing in a commanded A time and waiting
the way you do this is by using and maps built in scripting engine, which uses the loo, a programming language.
The creators of that map like to say the NSC provides the ability to automate networking tasks. Lula works very nicely for N map because it is an interpreted language and not compiled. That basically means that you can use any text editor to create your scripts than run them from the unmapped command line or within Zen map.
Lou is extremely lightweight and has been around and refined since early 19 nineties.
Learning it is very easy, and I think you'll find that it is well worth your time,
is fully documented on their website, and best of all, it's free and built in tow and map.
Each NSC script contains a field that associates it with one or more categories. Those categories are off for authorization. Broadcast default
Most of what and map is known for
buzzer Intrusive, which are potentially hostile.
for remote malware detection.
which has a little risk
version for version detection signatures and balm for vulnerability detection.
What is really great is that there are hundreds of NSC scripts that ship meaning downloaded install within map.
We'll go over how to find them, how to open and examine them and how to run them in different ways.
They're all very well documented at dot, or GE Quack and a C Doc.
Also, I should note that the code base of scripts on and map site is constantly being added to.
Finally, you really need to be careful with NSC scripts.
They have the potential to do harmful things to your computer,
computers on your network and target hosts.
Make sure you only run scripts that you downloaded from the and map website,
wrote yourself or got from someone you really trust.
As with any, and maps can understand the effects of the scan on both your computer and the target.
So how does the end map scripting engine work?
While this is sort of a trick question, because there are several regular command line switches that cause scripts to run by default,
for example, I've shown you the unmapped dash capital a scan in the past, which I call the advanced and aggressive scan that's can actually runs every NSC script that has been labeled in the category default, among other things.
But for the sake of clarity there to command line switches that can be used to specifically initiate the unmapped script scripting engine they are and map
and and map, dash, dash, script
like and Map Dash Capital A and Map Dash s Capital C also runs and maps can using all of the scripts that have been labeled in the default category. On the other hand and map Dash Dash script allows you to specify the exact script you wish to run or even an entire category of scripts.
There's some other flexibility with the dash dash script command line Switch to, for example, you can run every script that starts with a specific name.
Two or more scripts at the same time.
Or even use Boolean arguments to tell and map to run scripts that match certain criteria.
I'll show you this stuff in the lab.
The main point I'm trying to make your is that for the most part. If you want to run and map and a C scripts, you'll be using the dash dash script command line switch.
The last bullet point is a link to the online man page for NSC.
They're a couple other features and options that I won't be covering in this lesson. So I recommend that you navigate to this page to see some of the other options available to you as you run an A C scripts.
Okay, so enough talk, let's do a lab in this lab. I'm going to demonstrate some of Essie's capabilities. My main goal is to give you enough information about NSC that you feel comfortable trying it out for yourself.
Also want you to see how good and maps built in scripts are detecting vulnerabilities and exploiting them.
I truly believe that NSC is capabilities are only limited by user support and desire to contribute to this amazing tool in community. We're gonna find the Cisco switch on my network, see if it has some vulnerabilities and exploit them and see what happens
before we do that, though, I'll show you where to find NSC scripts and remind you how to get help information about them,
and I'll show you how to run several or many of them at the same time.