Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File http-avaya-ipoffice-users

Script types: portrule
Categories: exploit, vuln
Download: https://svn.nmap.org/nmap/scripts/http-avaya-ipoffice-users.nse

User Summary

Attempts to enumerate users in Avaya IP Office systems 7.x.

Avaya IP Office systems allow unauthenticated access to the URI '/system/user/scn_user_list' which returns a XML file containing user information such as display name, full name and extension number.

  • Tested on Avaya IP Office 7.0(27).

Script Arguments

slaxml.debug

See the documentation for the slaxml library.

http.max-cache-size, http.max-pipeline, http.pipeline, http.useragent

See the documentation for the http library.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

vulns.showall

See the documentation for the vulns library.

Example Usage

  • nmap -p80 --script http-avaya-ipoffice-users <target>
  • nmap -sV --script http-avaya-ipoffice-users <target>
    

Script Output

PORT   STATE SERVICE REASON         VERSION
80/tcp open  http    syn-ack ttl 99 Avaya IP Office VoIP PBX httpd 7.0(27)
| http-avaya-ipoffice-users:
|   title: Avaya IP Office User Listing
|   users:
|
|       full_name: John Doe
|       extension: 211
|       name: JDoe
|_  data_source: IPOFFICE/7.0(27) xxx.xxx.xxx.xxx

Requires


Author:

  • Paulino Calderon <calderon@websec.mx>

License: Same as Nmap--See https://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]