Nmap
What is NMAP?
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime.
To learn more about the Nmap scanner itself visit nmap.org.
NSE scripts
Currently, the secureCodeBox Nmap parser supports the smb-protocols
, ftp-anon
, and ftp-banner
script with compatibility for hostrules and portrules. If you want custom scripts to be parsed by secureCodeBox, you may contribute your script parser in parser/parser.js
under const scriptParser
const scriptParser = {
"ftp-anon": parseFtpAnon,
"banner": parseBanner,
"smb-protocols": parseSmbProtocols,
[...] // Contributed custom parsers
}
Scripts without an existing parser will only generate an open port finding. Scripts with parsers will add a script output finding.
Deployment
The nmap chart can be deployed via helm:
# Install HelmChart (use -n to configure another namespace)
helm upgrade --install nmap secureCodeBox/nmap
Scanner Configuration
The Nmap scan targets are specified as the last parameter. The target should be a hostname, an IP address or an IP range. See Nmap Docs for details.
Additional Nmap scan features can be configured via the parameter attribute. For a detailed explanation to which parameters are available refer to the Nmap Reference Guide. All parameters are supported, but be careful with parameters that require root level rights, as these require additional configuration on the ScanType to be supported.
Some useful example parameters listed below:
-p
xx: Scan ports of the target. Replace xx with a single port number or a range of ports.-PS
,-PA
,-PU
xx: Replace xx with the ports to scan. TCP SYN/ACK or UDP discovery.-sV
: Determine service and version info.-O
: Determine OS info. Note: This requires that Nmap is run as root, or that the user has the system capabilities to be extended to allow Nmap to send raw sockets. See more information on how to deploy the secureCodeBox nmap container to allow this and the nmap docs about privileged scans-A
: Determine service/version and OS info.-script
xx: Replace xx with the script name. Start the scan with the given script.--script
xx: Replace xx with a coma-separated list of scripts. Start the scan with the given scripts.
Requirements
Kubernetes: >=v1.11.0-0
Additional Chart Configurations
Operating System Scans
Warning! This is currently not tested and might require additional testing to work 😕
If you want to use Nmap to identify operating systems of hosts you'll need to weaken the securityContext config, as Nmap requires the capability to send raw sockets to identify operating systems. See Nmap Docs
You can deploy the ScanType with the config like this:
cat <<EOF | helm install nmap-privileged ./scanners/nmap --values -
scanner:
nameAppend: "-privileged"
env:
- name: "NMAP_PRIVILEGED"
value: "true"
securityContext:
capabilities:
drop:
- all
add:
- CAP_NET_RAW
- CAP_NET_ADMIN
- CAP_NET_BIND_SERVICE
EOF
Then, you can start scans with operating system identification enabled:
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nmap-os-scan"
spec:
scanType: "nmap-privileged"
parameters:
- --privileged
- "-O"
- www.iteratec.de
Values
Key | Type | Default | Description |
---|---|---|---|
cascadingRules.enabled | bool | false | Enables or disables the installation of the default cascading rules for this scanner |
imagePullSecrets | list | [] | Define imagePullSecrets when a private registry is used (see: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/) |
parser.affinity | object | {} | Optional affinity settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
parser.env | list | [] | Optional environment variables mapped into each parseJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
parser.image.pullPolicy | string | "IfNotPresent" | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
parser.image.repository | string | "docker.io/securecodebox/parser-nmap" | Parser image repository |
parser.image.tag | string | defaults to the charts version | Parser image tag |
parser.resources | object | { requests: { cpu: "200m", memory: "100Mi" }, limits: { cpu: "400m", memory: "200Mi" } } | Optional resources lets you control resource limits and requests for the parser container. See https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/ |
parser.scopeLimiterAliases | object | {} | Optional finding aliases to be used in the scopeLimiter. |
parser.tolerations | list | [] | Optional tolerations settings that control how the parser job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
parser.ttlSecondsAfterFinished | string | nil | seconds after which the Kubernetes job for the parser will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
scanner.activeDeadlineSeconds | string | nil | There are situations where you want to fail a scan Job after some amount of time. To do so, set activeDeadlineSeconds to define an active deadline (in seconds) when considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#job-termination-and-cleanup) |
scanner.affinity | object | {} | Optional affinity settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-pods-nodes-using-node-affinity/) |
scanner.backoffLimit | int | 3 | There are situations where you want to fail a scan Job after some amount of retries due to a logical error in configuration etc. To do so, set backoffLimit to specify the number of retries before considering a scan Job as failed. (see: https://kubernetes.io/docs/concepts/workloads/controllers/job/#pod-backoff-failure-policy) |
scanner.env | list | [] | Optional environment variables mapped into each scanJob (see: https://kubernetes.io/docs/tasks/inject-data-application/define-environment-variable-container/) |
scanner.extraContainers | list | [] | Optional additional Containers started with each scanJob (see: https://kubernetes.io/docs/concepts/workloads/pods/init-containers/) |
scanner.extraVolumeMounts | list | [] | Optional VolumeMounts mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
scanner.extraVolumes | list | [] | Optional Volumes mapped into each scanJob (see: https://kubernetes.io/docs/concepts/storage/volumes/) |
scanner.image.pullPolicy | string | "IfNotPresent" | Image pull policy. One of Always, Never, IfNotPresent. Defaults to Always if :latest tag is specified, or IfNotPresent otherwise. More info: https://kubernetes.io/docs/concepts/containers/images#updating-images |
scanner.image.repository | string | "docker.io/securecodebox/scanner-nmap" | Container Image to run the scan |
scanner.image.tag | string | nil | defaults to the charts appVersion |
scanner.nameAppend | string | nil | append a string to the default scantype name. |
scanner.podSecurityContext | object | {} | Optional securityContext set on scanner pod (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
scanner.resources | object | {} | CPU/memory resource requests/limits (see: https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/, https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/) |
scanner.securityContext | object | {"allowPrivilegeEscalation":false,"capabilities":{"drop":["all"]},"privileged":false,"readOnlyRootFilesystem":true,"runAsNonRoot":true} | Optional securityContext set on scanner container (see: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/) |
scanner.securityContext.allowPrivilegeEscalation | bool | false | Ensure that users privileges cannot be escalated |
scanner.securityContext.capabilities.drop[0] | string | "all" | This drops all linux privileges from the container. |
scanner.securityContext.privileged | bool | false | Ensures that the scanner container is not run in privileged mode |
scanner.securityContext.readOnlyRootFilesystem | bool | true | Prevents write access to the containers file system |
scanner.securityContext.runAsNonRoot | bool | true | Enforces that the scanner image is run as a non root user |
scanner.suspend | bool | false | if set to true the scan job will be suspended after creation. You can then resume the job using kubectl resume <jobname> or using a job scheduler like kueue |
scanner.suspend | bool | false | if set to true the scan job will be suspended after creation. You can then resume the job using kubectl resume <jobname> or using a job scheduler like kueue |
scanner.tolerations | list | [] | Optional tolerations settings that control how the scanner job is scheduled (see: https://kubernetes.io/docs/concepts/scheduling-eviction/taint-and-toleration/) |
scanner.ttlSecondsAfterFinished | string | nil | seconds after which the Kubernetes job for the scanner will be deleted. Requires the Kubernetes TTLAfterFinished controller: https://kubernetes.io/docs/concepts/workloads/controllers/ttlafterfinished/ |
License
Code of secureCodeBox is licensed under the Apache License 2.0.
CPU architectures
The scanner is currently supported for these CPU architectures:
- linux/amd64
- linux/arm64
Examples
basic-example
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nmap-scanme.nmap.org"
spec:
scanType: "nmap"
parameters:
- scanme.nmap.org
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[
{
"name": "Open Port: 22 (ssh)",
"description": "Port 22 is open using tcp protocol.",
"category": "Open Port",
"location": "tcp://scanme.nmap.org:22",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 22,
"state": "open",
"ip_addresses": ["45.33.32.156"],
"mac_address": null,
"protocol": "tcp",
"hostname": "scanme.nmap.org",
"method": "table",
"operating_system": null,
"service": "ssh",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "dc8d4c7d-56be-411c-8aca-cd4309821f7a",
"parsed_at": "2023-04-09T11:35:43.573Z"
},
{
"name": "Open Port: 80 (http)",
"description": "Port 80 is open using tcp protocol.",
"category": "Open Port",
"location": "tcp://scanme.nmap.org:80",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 80,
"state": "open",
"ip_addresses": ["45.33.32.156"],
"mac_address": null,
"protocol": "tcp",
"hostname": "scanme.nmap.org",
"method": "table",
"operating_system": null,
"service": "http",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "7f6f6cfe-afc7-4596-b658-1c5555b13bb5",
"parsed_at": "2023-04-09T11:35:43.573Z"
},
{
"name": "Open Port: 135 (msrpc)",
"description": "Port 135 is filtered using tcp protocol.",
"category": "Open Port",
"location": "tcp://scanme.nmap.org:135",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 135,
"state": "filtered",
"ip_addresses": ["45.33.32.156"],
"mac_address": null,
"protocol": "tcp",
"hostname": "scanme.nmap.org",
"method": "table",
"operating_system": null,
"service": "msrpc",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "46b8d4dd-e014-4cdd-9c5f-bdcfbddd61b1",
"parsed_at": "2023-04-09T11:35:43.573Z"
},
{
"name": "Open Port: 139 (netbios-ssn)",
"description": "Port 139 is filtered using tcp protocol.",
"category": "Open Port",
"location": "tcp://scanme.nmap.org:139",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 139,
"state": "filtered",
"ip_addresses": ["45.33.32.156"],
"mac_address": null,
"protocol": "tcp",
"hostname": "scanme.nmap.org",
"method": "table",
"operating_system": null,
"service": "netbios-ssn",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "2ce63b36-ee70-4137-9473-e69e01c09ca5",
"parsed_at": "2023-04-09T11:35:43.573Z"
},
{
"name": "Open Port: 445 (microsoft-ds)",
"description": "Port 445 is filtered using tcp protocol.",
"category": "Open Port",
"location": "tcp://scanme.nmap.org:445",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 445,
"state": "filtered",
"ip_addresses": ["45.33.32.156"],
"mac_address": null,
"protocol": "tcp",
"hostname": "scanme.nmap.org",
"method": "table",
"operating_system": null,
"service": "microsoft-ds",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "ce217a70-bec6-4ba5-8273-06f233dc89bf",
"parsed_at": "2023-04-09T11:35:43.573Z"
},
{
"name": "Open Port: 9929 (nping-echo)",
"description": "Port 9929 is open using tcp protocol.",
"category": "Open Port",
"location": "tcp://scanme.nmap.org:9929",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 9929,
"state": "open",
"ip_addresses": ["45.33.32.156"],
"mac_address": null,
"protocol": "tcp",
"hostname": "scanme.nmap.org",
"method": "table",
"operating_system": null,
"service": "nping-echo",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "97caafb8-050a-466c-94f3-cfa5b41cb823",
"parsed_at": "2023-04-09T11:35:43.573Z"
},
{
"name": "Open Port: 31337 (Elite)",
"description": "Port 31337 is open using tcp protocol.",
"category": "Open Port",
"location": "tcp://scanme.nmap.org:31337",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 31337,
"state": "open",
"ip_addresses": ["45.33.32.156"],
"mac_address": null,
"protocol": "tcp",
"hostname": "scanme.nmap.org",
"method": "table",
"operating_system": null,
"service": "Elite",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "67254a13-cbbc-409e-9248-52e81f48ca6e",
"parsed_at": "2023-04-09T11:35:43.573Z"
},
{
"name": "Host: scanme.nmap.org",
"category": "Host",
"description": "Found a host",
"location": "scanme.nmap.org",
"severity": "INFORMATIONAL",
"osi_layer": "NETWORK",
"attributes": {
"ip_addresses": ["45.33.32.156"],
"hostname": "scanme.nmap.org",
"operating_system": null
},
"id": "2dcd5bc7-e6ec-4b16-b408-9a18cd111b8f",
"parsed_at": "2023-04-09T11:35:43.573Z"
}
]
example-with-parameters
- Scan
- Findings
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
apiVersion: "execution.securecodebox.io/v1"
kind: Scan
metadata:
name: "nmap-juice-shop-cluster-internal"
spec:
scanType: "nmap"
parameters:
# Internal cluster is blocking our ping probes, therefore we skip them
- "-Pn"
# Service Detection enabled
- "-sV"
# Actual Service Address will depend on your cluster and namespace configuration. 🤷
- juice-shop.demo-targets.svc.cluster.local
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0
[
{
"name": "Open Port: 3000 (ppp)",
"description": "Port 3000 is open using tcp protocol.",
"category": "Open Port",
"location": "tcp://juice-shop.demo-targets.svc.cluster.local:3000",
"osi_layer": "NETWORK",
"severity": "INFORMATIONAL",
"attributes": {
"port": 3000,
"state": "open",
"ip_addresses": ["10.102.186.25"],
"mac_address": null,
"protocol": "tcp",
"hostname": "juice-shop.demo-targets.svc.cluster.local",
"method": "table",
"operating_system": null,
"service": "ppp",
"serviceProduct": null,
"serviceVersion": null,
"scripts": null,
"tunnel": null
},
"id": "f5c84b36-33db-45a0-9651-1b80e1191716",
"parsed_at": "2023-04-09T11:36:47.116Z"
},
{
"name": "Host: juice-shop.demo-targets.svc.cluster.local",
"category": "Host",
"description": "Found a host",
"location": "juice-shop.demo-targets.svc.cluster.local",
"severity": "INFORMATIONAL",
"osi_layer": "NETWORK",
"attributes": {
"ip_addresses": ["10.102.186.25"],
"hostname": "juice-shop.demo-targets.svc.cluster.local",
"operating_system": null
},
"id": "6fb0cc59-d8e9-4872-9aff-659f6899eafb",
"parsed_at": "2023-04-09T11:36:47.116Z"
}
]