PoshNmap icon indicating copy to clipboard operation
PoshNmap copied to clipboard

How to run scripts correctly in invoke-nmap?

Open taalmahret opened this issue 2 years ago • 0 comments

How would I run this command within invoke-nmap?

nmap -Pn -sV --script ssl-enum-ciphers -p 3389 10.3.0.50

I've tried to run this command

invoke-nmap -computerName '10.3.0.50' -ArgumentList '--script ssl-enum-ciphers -p 3389' -OutFormat PSObject

But I cannot get the output that I need into a psobject..... i would like to consume the ciphers on a machine.

PORT STATE SERVICE 3389/tcp open ms-wbt-server ssl-enum-ciphers: TLSv1.0: ciphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity TLSv1.1: ciphers: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity TLSv1.2: ciphers: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C TLS_RSA_WITH_RC4_128_SHA (rsa 2048) - C TLS_RSA_WITH_RC4_128_MD5 (rsa 2048) - C compressors: NULL cipher preference: server warnings: 64-bit block cipher 3DES vulnerable to SWEET32 attack Broken cipher RC4 is deprecated by RFC 7465 Ciphersuite uses MD5 for message integrity least strength: C

taalmahret avatar Feb 07 '23 07:02 taalmahret