Я пытаюсь понять, как работает скрипт Nmap NSE. Я использую несколько скриптов сканирования хоста, но все они просто ничего не показывают, даже не говорят, что результата нет. Это нормально, что делает Nmap? Например, как показано ниже, я запускаю 3 разных скрипта, но все они возвращают одно и то же.
s# nmap -T4 --script ftp-proftpd-backdoor.nse 192.168.13.205
Starting Nmap 6.47 ( http://nmap.org ) at 2015-08-18 01:34 EDT
Nmap scan report for 192.168.13.205
Host is up (0.22s latency).
Not shown: 982 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1030/tcp open iad1
1036/tcp open nsstp
1521/tcp open oracle
2030/tcp open device2
2100/tcp open amiganetfs
3372/tcp open msdtc
3389/tcp open ms-wbt-server
4443/tcp open pharos
7778/tcp open interwise
8080/tcp open http-proxy
MAC Address: 00:50:56:AF:3E:05 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 15.21 seconds
root@kali:/usr/share/nmap/scripts# nmap -T4 --script ftp-vuln-cve2010-4221.nse 192.168.13.205
Starting Nmap 6.47 ( http://nmap.org ) at 2015-08-18 01:35 EDT
Nmap scan report for 192.168.13.205
Host is up (0.22s latency).
Not shown: 982 closed ports
PORT STATE SERVICE
21/tcp open ftp
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1030/tcp open iad1
1036/tcp open nsstp
1521/tcp open oracle
2030/tcp open device2
2100/tcp open amiganetfs
3372/tcp open msdtc
3389/tcp open ms-wbt-server
4443/tcp open pharos
7778/tcp open interwise
8080/tcp open http-proxy
MAC Address: 00:50:56:AF:3E:05 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 16.65 seconds
root@kali:/usr/share/nmap/scripts#
s# nmap -T4 --script ftp-anon 192.168.13.205
Starting Nmap 6.47 ( http://nmap.org ) at 2015-08-18 01:45 EDT
Nmap scan report for 192.168.13.205
Host is up (0.22s latency).
Not shown: 983 closed ports
PORT STATE SERVICE
21/tcp open ftp
|_ftp-anon: Anonymous FTP login allowed (FTP code 230)
80/tcp open http
135/tcp open msrpc
139/tcp open netbios-ssn
443/tcp open https
445/tcp open microsoft-ds
1026/tcp open LSA-or-nterm
1029/tcp open ms-lsa
1030/tcp open iad1
1036/tcp open nsstp
1521/tcp open oracle
2030/tcp open device2
2100/tcp open amiganetfs
3372/tcp open msdtc
4443/tcp open pharos
7778/tcp open interwise
8080/tcp open http-proxy
MAC Address: 00:50:56:AF:3E:05 (VMware)
Nmap done: 1 IP address (1 host up) scanned in 16.21 seconds
root@kali:/usr/share/nmap/scripts#