Script nrpe-enum

Script types: portrule
Categories: discovery, intrusive
Download: https://svn.nmap.org/nmap/scripts/nrpe-enum.nse

Script Summary

Queries Nagios Remote Plugin Executor (NRPE) daemons to obtain information such as load averages, process counts, logged in user information, etc.

This script attempts to execute the stock list of commands that are enabled. User-supplied arguments are not supported.

Script Arguments

nrpe-enum.cmds

A colon-separated list of commands to be executed.

Example Usage

nmap --script nrpe-enum -p 5666 <host>

Script Output

PORT     STATE SERVICE REASON
5666/tcp open  nrpe    syn-ack
| nrpe-enum:
| Command             State     Response
| check_hda1          CRITICAL  NRPE: Command 'check_hda1' not defined
| check_load          OK        OK - load average: 1.00, 1.00, 1.00|load1=1.000;15.000;30.000;0; load5=1.000;10.000;25.000;0; load15=1.000;5.000;20.000;0;
| check_total_procs   OK        PROCS OK: 5 processes
| check_users         WARNING   USERS WARNING - 2 users currently logged in |users=2;0;10;0
|_check_zombie_procs  OK        PROCS OK: 0 processes with STATE = Z

Requires


Author:

  • Mak Kolybabi

License: Same as Nmap--See https://nmap.org/book/man-legal.html