Skip to main content
Blog November 29, 2016

New publication: Mastering the Nmap Scripting Engine

We invite you to learn more about the latest publication from our team, "Mastering the Nmap Scripting Engine".

Share this article:

Mastering the Nmap Scripting Engine cover

My newest book Mastering the Nmap Scripting Engine has finally been published. In this book I teach how to use the powerful scripting engine incorporated in Nmap and I share my secrets when it comes to developing NSE scripts.

 

All the functionality of the Nmap Scripting Engine is explored through 10 chapters which cover from basic concepts and operations to libraries that help expand the functionality of Nmap, so that users can develop their own scripts. The table of contents is as follows:

  • Chapter 1: Introduction to the Nmap Scripting Engine
  • Chapter 2: Lua fundamentals
  • Chapter 3: NSE data files
  • Chapter 4: Exploring the Nmap Scripting Engine API and libraries
  • Chapter 5: Enhancing version detection
  • Chapter 6: Developing brute force password auditing scripts
  • Chapter 7: Formatting script output
  • Chapter 8: Working with network sockets and binary data
  • Chapter 9: Parallelism
  • Chapter 10: Vulnerability detection and exploitation


The information that I chose for this book tries to answer one of the most asked questions on the Nmap development forum: How do I start developing NSE scripts?

I welcome your comments and don't forget you can download a chapter of the book for free.

Links

 

This post was originally written by Paulino Calderon and translated by Roberto Salgado. The originally post in Spanish can be found here.

Subscribe to our Newsletter

Get the latest cybersecurity insights and updates delivered to your inbox.

Related Articles

Discover more cybersecurity insights and solutions to help strengthen your organization's security posture

Image unavailable
Blog October 3, 2023

A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation

In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.

Image unavailable
Blog May 19, 2022

CVE-2022-21404: Another story of developers fixing vulnerabilities unknowingly because of CodeQL

How CodeQL may help reduce false negatives within Open-Source projects. Taking a look into a deserialization vulnerability within Oracle Helidon (CVE-2022-21404).

Image unavailable
Blog September 2, 2021

Cybersecurity in Web Applications - Where to start? Where to improve? Where to learn more?

A list of resources for web application security and a short description of what each resource covers.