Robot Framework Library for the Nmap Port and Vulnerability Scanner.
| nmap default scan | target | file_export |
- file_export is an optional param that exports the file to a txt file with the -oN flag
| nmap all tcp scan | target | file_export |
- file_export is an optional param that exports the file to a txt file with the
-oN
flag
Runs nmap against specified UDP ports given in the portlist argument.
Arguments:
target
: IP or the range of IPs that need to be tested.portlist
: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen, example: 121,161,240 or 1-100file_export
: is an optional param that exports the file to a txt file with the -oN flag Examples:| nmap specific udp scan | target | portlist |
Arguments:
target
: IP or the range of IPs that need to be testedportlist
: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100version_intense
: Version intensity of OS detectionfile_export
: is an optional param that exports the file to a txt file with the-oN
flag Examples:| nmap os services scan | target | portlist | version_intense | file_export |
Runs nmap with the -sC
arg or the --script
arg if script_name
is provided. Options used are: -sV --version-intensity <default:0> -sC|--script=<script_name>
Arguments:
target
: IP or the range of IPs that need to be testedportlist
: list of ports, range of ports that need to be tested. They can either be comma separated or separated by hyphen example: 121,161,240 or 1-100version_intense
: Version intensity of OS detectionscript_name
: Script Name that needs to be referencedfile_export
: is an optional param that exports the file to a txt file with the-oN
flag Examples:| nmap script scan | target | portlist | version_intense | script_name | file_export |
Retrieves the results of the current nmap scan results Examples:
| nmap print results |