Script nrpe-enum
Script types:
portrule
Categories:
discovery, intrusive
Download: https://svn.nmap.org/nmap/scripts/nrpe-enum.nse
Script Summary
Queries Nagios Remote Plugin Executor (NRPE) daemons to obtain information such as load averages, process counts, logged in user information, etc.
This script attempts to execute the stock list of commands that are enabled. User-supplied arguments are not supported.
Script Arguments
- nrpe-enum.cmds
A colon-separated list of commands to be executed.
Example Usage
nmap --script nrpe-enum -p 5666 <host>
Script Output
PORT STATE SERVICE REASON 5666/tcp open nrpe syn-ack | nrpe-enum: | Command State Response | check_hda1 CRITICAL NRPE: Command 'check_hda1' not defined | check_load OK OK - load average: 1.00, 1.00, 1.00|load1=1.000;15.000;30.000;0; load5=1.000;10.000;25.000;0; load15=1.000;5.000;20.000;0; | check_total_procs OK PROCS OK: 5 processes | check_users WARNING USERS WARNING - 2 users currently logged in |users=2;0;10;0 |_check_zombie_procs OK PROCS OK: 0 processes with STATE = Z
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html