Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File snmp-interfaces

Script types: prerule, portrule
Categories: default, discovery, safe
Download: http://nmap.org/svn/scripts/snmp-interfaces.nse

User Summary

Attempts to enumerate network interfaces through SNMP.

This script can also be run during Nmap's pre-scanning phase and can attempt to add the SNMP server's interface addresses to the target list. The script argument snmp-interfaces.host is required to know what host to probe. To specify a port for the SNMP server other than 161, use snmp-interfaces.port. When run in this way, the script's output tells how many new targets were successfully added.

Script Arguments

snmp-interfaces.host

Specifies the SNMP server to probe when running in the "pre-scanning phase".

snmp-interfaces.port

The optional port number corresponding to the host script argument. Defaults to 161.

max-newtargets, newtargets

See the documentation for the target library.

Example Usage

nmap -sU -p 161 --script=snmp-interfaces <target>

Script Output

| snmp-interfaces:
|   eth0
|     IP address: 192.168.221.128
|     MAC address: 00:0c:29:01:e2:74 (VMware)
|     Type: ethernetCsmacd  Speed: 1 Gbps
|_    Traffic stats: 6.45 Mb sent, 15.01 Mb received

Requires


Author: Thomas Buchanan, Kris Katterjohn

License: Same as Nmap--See http://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]