The Nmap Network Scanner is a microservice that comes with the default scanprocess collection of the SecureCodeBox and utilizes the Nmap Security Scanner. The main purpose of the scanner is to identify open ports, active hosts, active services or operating systems running on a target system and using that information to find security vulnerabilities. In addition there are lots of other powerful features like the Nmap Scripting Engine for example, which can be used to write your own scripts and run them against a specified target. For a detailed description of Nmap please refer to the Nmap Website.
When the scanner is started the following variables need to be configured:
NMAP_CONTEXT: The business context under which the scan should be executedNMAP_TARGET: The scanner target (e.g. localhost, 132.145.77.11, example.com, etc.)NMAP_TARGET_NAME: Specifies a name for the target (Used in the Results).NMAP_CONFIGURATION_TYPE: default or advanced. When set to advanced, additional options can be specified.PROCESS_MARK_FALSE_POSITIVE: Specifies if an additional task should be executed, which checks for false-positive results
For information how to start a scanner see Starting Scan Processes
If the NMAP_CONFIGURATION_TYPE is set to advanced, you have the
option to change the NMAP_TARGET again.
Furthermore additional options for the Nmap parameters
can be defined. The most important options are:
-pxx: Scan ports of the target. Replace xx with a single port number or a range of ports.-PS,-PA,-PUxx: Replace xx with the ports to scan. TCP SYN/ACK or UDP discovery.-sV: Determine service and version info.-O: Determine OS info.-A: Determine service/version and OS info.-scriptxx: Replace xx with the script name. Start the scan with the given script.--scriptxx: Replace xx with a coma-separated list of scripts. Start the scan with the given scripts.
A list of options is available in the input form of the scanner configuration. For a detailed explanation refer to the Nmap Reference Guide.
Like all SecureCodeBox scanners the Nmap scanner returns a report which contains a list of findings. Each of the findings contains the following entries:
idnamedescriptioncategoryosiLayerseverityreferencehintlocationattributes
For a detailed description of these fields, refer to Add reference here, when existing.
The attributes field contains the following:
port: When an open port is found, this specifies the port numberip_address: The IP Address of the scanned hostmac_address: The MAC Address of the scanned hostprotocol: The protocol, which was used by the scannerstart: The start time of the scanend: The end time of the scanstate: The state of the port (open, filtered, closed, unfiltered)service: The service running on the port
Note: The PROCESS_RAW_FINDINGS field of the Camunda process contains the unparsed and unfiltered XML-output of the Nmap scan.