Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File pcworx-info

Script types: portrule
Categories: discovery
Download: https://svn.nmap.org/nmap/scripts/pcworx-info.nse

User Summary

This NSE script will query and parse pcworx protocol to a remote PLC. The script will send a initial request packets and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. PCWorx is a protocol and Program by Phoenix Contact.

http://digitalbond.com

Example Usage

nmap --script pcworx-info -p 1962 <host>

Script Output

| pcworx-info:
|   PLC Type: ILC 330 ETH
|   Model Number: 2737193
|   Firmware Version: 3.95T
|   Firmware Date: Mar  2 2012
|_  Firmware Time: 09:39:02

Requires


Author:

  • Stephen Hilt (Digital Bond)

License: Same as Nmap--See https://nmap.org/book/man-legal.html

action

action (host, port)

Action Function that is used to run the NSE. This function will send the initial query to the host and port that were passed in via nmap. The initial response is parsed to determine if host is a pcworx Protocol device. If it is then more actions are taken to gather extra information.

Parameters

  • host: Host that was scanned via nmap
  • port: port that was scanned via nmap

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]