Script jdwp-info
Script types:
portrule
Categories:
default, safe, discovery
Download: https://svn.nmap.org/nmap/scripts/jdwp-info.nse
Script Summary
Attempts to exploit java's remote debugging port. When remote debugging port is left open, it is possible to inject java bytecode and achieve remote code execution. This script injects and execute a Java class file that returns remote system information.
Example Usage
nmap -sT <target> -p <port> --script=+jdwp-info
Script Output
PORT STATE SERVICE REASON 2010/tcp open search syn-ack | jdwp-info: | Available processors: 1 | Free memory: 15331736 | File system root: A:\ | Total space (bytes): 0 | Free space (bytes): 0 | File system root: C:\ | Total space (bytes): 42935926784 | Free space (bytes): 29779054592 | File system root: D:\ | Total space (bytes): 0 | Free space (bytes): 0 | Name of the OS: Windows XP | OS Version : 5.1 | OS patch level : Service Pack 3 | OS Architecture: x86 | Java version: 1.7.0_01 | Username: user | User home: C:\Documents and Settings\user |_ System time: Sat Aug 11 15:21:44 CEST 2012
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html
portrule
- portrule (host, port)
-
Parameters
- host
- port
Usage:
nmap -sT <target> -p <port> --script=+jdwp-info