# Nmap nmap payload database -*- mode: fundamental; -*- # $Id$ # # These payloads are sent with every host discovery or port scan probe # by default. This database should only include payloads that are # unlikely to crash services, trip IDS alerts, or change state on the # server. The idea behind these is to evoke a response using a payload. # Some of them are taken from nmap-service-probes. # # This collection of data is (C) 1996-2010 by Insecure.Com # LLC. It is distributed under the Nmap Open Source license as # provided in the COPYING file of the source distribution or at # http://nmap.org/data/COPYING . Note that this license # requires you to license your own work under a compatible open source # license. If you wish to embed Nmap technology into proprietary # software, we sell alternative licenses (contact sales@insecure.com). # Dozens of software vendors already license Nmap technology such as # host discovery, port scanning, OS detection, and version detection. # For more details, see http://nmap.org/book/man-legal.html # # Each entry begins with a protocol (only "udp" is supported) followed # by a comma-separated list of ports, followed by one or more quoted # strings containing the payload. These elements may be broken across # several lines. For future expansion, additional keywords may follow # the payload data. Any data following one of these keywords must be on # the same line as the keyword so that unknown keywords can be ignored # by the parser. Currently this file contains some entries with the # "source" keyword to specify a desired source port, but it is not # honored by Nmap. # # Example: # udp 1234 "payloaddatapayloaddata" # "payloaddatapayloaddata" # source 5678 # GenericLines. Use for the echo service. udp 7 "\x0D\x0A\x0D\x0A" # DNSStatusRequest udp 53 "\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00" # RPCCheck udp 111 "\x72\xFE\x1D\x13\x00\x00\x00\x00\x00\x00\x00\x02\x00\x01\x86\xA0" "\x00\x01\x97\x7C\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00" # NTPRequest udp 123 "\xE3\x00\x04\xFA\x00\x01\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\xC5\x4F\x23\x4B\x71\xB1\x52\xF3" # NBTStat udp 137 "\x80\xF0\x00\x10\x00\x01\x00\x00\x00\x00\x00\x00" "\x20CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\x00\x00\x21\x00\x01" # SNMPv3GetRequest udp 161 "\x30\x3A\x02\x01\x03\x30\x0F\x02\x02\x4A\x69\x02\x03\x00\xFF\xE3" "\x04\x01\x04\x02\x01\x03\x04\x10\x30\x0E\x04\x00\x02\x01\x00\x02" "\x01\x00\x04\x00\x04\x00\x04\x00\x30\x12\x04\x00\x04\x00\xA0\x0C" "\x02\x02\x37\xF0\x02\x01\x00\x02\x01\x00\x30\x00" # Sqlping - disabled because it trips a Snort rule with SID 2049 # ("MS-SQL ping attempt"). # udp 1434 "\x02" # xdmcp - X Display Manager Control Protocol. Version 1, packet type # Query (2), no authorization names. We expect a Willing or Unwilling # packet in reply. # http://cgit.freedesktop.org/xorg/doc/xorg-docs/plain/hardcopy/XDMCP/xdmcp.PS.gz udp 177 "\x00\x01\x00\x02\x00\x01\x00" # svrloc udp 427 "\x02\x01\x00\x006 \x00\x00\x00\x00\x00\x01\x00\x02en\x00\x00\x00\x15" "service:service-agent\x00\x07default\x00\x00\x00\x00" # Internet Key Exchange version 1, phase 1 Main Mode. We offer every # combination of (DES, 3DES) and (MD5, SHA) in the hope that one of them will # be acceptable. Because we use a fixed cookie, we set the association lifetime # to 1 second to reduce the chance that repeated probes will look like # retransmissions (and therefore not get a response). This payload comes from # ike-scan --lifetime 1 --cookie 0011223344556677 --trans=5,2,1,2 --trans=5,1,1,2 --trans=1,2,1,2 --trans=1,1,1,2 # We expect another phase 1 message in response. This payload works better with # a source port of 500 or a randomized initiator cookie. udp 500 # Initiator cookie 0x0011223344556677, responder cookie 0x0000000000000000. "\x00\x11\x22\x33\x44\x55\x66\x77\x00\x00\x00\x00\x00\x00\x00\x00" # Version 1, Main Mode, flags 0x00, message ID 0x00000000, length 192. "\x01\x10\x02\x00\x00\x00\x00\x00\x00\x00\x00\xC0" # Security Association payload, length 164, IPSEC, IDENTITY. "\x00\x00\x00\xA4\x00\x00\x00\x01\x00\x00\x00\x01" # Proposal 1, length 152, ISAKMP, 4 transforms. "\x00\x00\x00\x98\x01\x01\x00\x04" # Transform 1, 3DES-CBC, SHA, PSK, group 2. "\x03\x00\x00\x24\x01\x01\x00\x00\x80\x01\x00\x05\x80\x02\x00\x02" "\x80\x03\x00\x01\x80\x04\x00\x02" "\x80\x0B\x00\x01\x00\x0C\x00\x04\x00\x00\x00\x01" # Transform 2, 3DES-CBC, MD5, PSK, group 2. "\x03\x00\x00\x24\x02\x01\x00\x00\x80\x01\x00\x05\x80\x02\x00\x01" "\x80\x03\x00\x01\x80\x04\x00\x02" "\x80\x0B\x00\x01\x00\x0C\x00\x04\x00\x00\x00\x01" # Transform 3, DES-CBC, SHA, PSK, group 2. "\x03\x00\x00\x24\x03\x01\x00\x00\x80\x01\x00\x01\x80\x02\x00\x02" "\x80\x03\x00\x01\x80\x04\x00\x02" "\x80\x0B\x00\x01\x00\x0C\x00\x04\x00\x00\x00\x01" # Transform 4, DES-CBC, MD5, PSK, group 2. "\x00\x00\x00\x24\x04\x01\x00\x00\x80\x01\x00\x01\x80\x02\x00\x01" "\x80\x03\x00\x01\x80\x04\x00\x02" "\x80\x0B\x00\x01\x00\x0C\x00\x04\x00\x00\x00\x01" source 500 # Routing Information Protocol version 1. Special-case request for the entire # routing table (address family 0, address 0.0.0.0, metric 16). RFC 1058, # section 3.4.1. udp 520 "\x01\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x10" # serialnumberd. This service runs on Mac OS X Server. This probe # requests the serial number of another server. In response we expect a # packet starting with "SNRESPS:", followed by some data whose purpose # is not known. udp 626 "SNQUERY: 127.0.0.1:AAAAAA:xsvr" # Citrix MetaFrame application browser service # Original idea from http://sh0dan.org/oldfiles/hackingcitrix.html # Payload contents copied from Wireshark capture of Citrix Program # Neighborhood client application. The application uses this payload to # locate Citrix servers on the local network. Response to this probe is # a 48 byte UDP payload as shown here: # # 0000 30 00 02 31 02 fd a8 e3 02 00 06 44 c0 a8 80 55 # 0010 00 00 00 00 00 00 00 00 00 00 00 00 02 00 06 44 # 0020 c0 a8 80 56 00 00 00 00 00 00 00 00 00 00 00 00 # # The first 12 bytes appear to be the same in all responses. # # Bytes 0x00 appears to be a packet length field # Bytes 0x0C - 0x0F are the IP address of the server # Bytes 0x10 - 0x13 may vary, 0x14 - 0x1F do not appear to # Bytes 0x20 - 0x23 are the IP address of the primary system in a server farm # configuration # Bytes 0x24 - 0x27 can vary, 0x28 - 0x2F do not appear to udp 1604 "\x1e\x00\x01\x30\x02\xfd\xa8\xe3\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" # RADIUS Access-Request. This is a degenerate packet with no username or # password; we expect an Access-Reject in response. The Identifier and Request # Authenticator are both 0. It was generated by running # echo 'User-Password = ""' | radclient auth "" # and then manually stripping out the password. # # Section 2 of the RFC says "A request from a client for which the # RADIUS server does not have a shared secret MUST be silently # discarded." So this payload only works when the server is configured # (or misconfigured) to know the scanning machine as a client. # # RFC 2865: "The early deployment of RADIUS was done using UDP port # number 1645, which conflicts with the "datametrics" service. The # officially assigned port number for RADIUS is 1812. udp 1645,1812 "\x01\x00\x00\x14" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" # NFS version 2, RFC 1831. XID 0x00000000, program 100003 (NFS), procedure # NFSPROC_NULL (does nothing, see section 2.2.1), null authentication (see # section 9.1). udp 2049 "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x01\x86\xA3" "\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00" # Freelancer game server status query # http://sourceforge.net/projects/gameq/ # (relevant files: games.ini, packets.ini, freelancer.php) udp 2302 "\x00\x02\xf1\x26\x01\x26\xf0\x90\xa6\xf0\x26\x57\x4e\xac\xa0\xec\xf8\x68\xe4\x8d\x21" # Sun Service Tag Discovery protocol (stdiscover) # http://arc.opensolaris.org/caselog/PSARC/2006/638/stdiscover_protocolv2.pdf # Would work better with a varying cookie; the second and later sends of this # probe will be interpreted as resends by the server and will be ignored. udp 6481 "[PROBE] 0000" # NAT-PMP external IP address request. See section 3.2 of # http://files.dns-sd.org/draft-cheshire-nat-pmp.txt. udp 5351 "\x00\x00" # DNS Service Discovery (DNS-SD) service query, as used in Zeroconf. # Transaction ID 0x0000, flags 0x0000, 1 question: PTR query for # _services._dns-sd._udp.local. If the remote host supports DNS-SD it will send # back a list of all its services. This is the same as a packet capture of # dns-sd -B _services._dns-sd._udp . # See section 9 of # http://files.dns-sd.org/draft-cheshire-dnsext-dns-sd.txt. udp 5353 "\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00" "\x09_services\x07_dns-sd\x04_udp\x05local\x00\x00\x0C\x00\x01" # Amanda backup service noop request. I think that this does nothing on the # server but only asks it to send back its feature list. In reply we expect an # ACK or (more likely) an ERROR. I couldn't find good online documentation of # the Amanda network protocol. There is parsing code in the Amanda source at # common-src/security-util.c. This is based on a packet capture of # amcheck udp 10080 "Amanda 2.6 REQ HANDLE 000-00000000 SEQ 0\n" "SERVICE noop\n" # VxWorks Wind River Debugger udp 17185 # Random XID "\x00\x00\x00\x00" # RPC version 2 procedure call "\x00\x00\x00\x00\x00\x00\x00\x02" # WDB version 1 "\x55\x55\x55\x55\x00\x00\x00\x01" # WDB_TARGET_PING "\x00\x00\x00\x00" # RPC Auth NULL "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" # Checksum "\xff\xff\x55\x13" # WDB wrapper (length and sequence number) "\x00\x00\x00\x30\x00\x00\x00\x01" # Empty data? "\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00" # Quake 2 and Quake 3 game servers (and servers of derived games like Nexuiz). # Gets game information from the server (see probe responses in # nmap-service-probes). These services typically run on a base port or a # few numbers higher. # Quake 2. Typical ports: 27910-97914. udp 27910,27911,27912,27913,27914 "\xff\xff\xff\xffstatus" # Quake 3. Typical ports: # 26000-26004: Nexuiz # 27960-27964: Various games # 30720-30724: Tremulous # 44400: Warsow udp 26000,26001,26002,26003,26004,27960,27961,27962,27963,27964,30720,30721,30722,30723,30724,44400 "\xff\xff\xff\xffgetstatus" # Murmur 1.2.X (Mumble server) # UDP ping. "abcdefgh" is an identifier. See # http://mumble.sourceforge.net/Protocol. udp 64738 "\x00\x00\x00\x00abcdefgh" # Ventrilo 2.1.2+ # UDP general status request (encrypted). # See http://aluigi.altervista.org/papers.htm#ventrilo udp 3784 "\x01\xe7\xe5\x75\x31\xa3\x17\x0b\x21\xcf\xbf\x2b\x99\x4e\xdd\x19\xac\xde\x08\x5f\x8b\x24\x0a\x11\x19\xb6\x73\x6f\xad\x28\x13\xd2\x0a\xb9\x12\x75" # TeamSpeak 2 # UDP login request # See http://wiki.wireshark.org/TeamSpeak2 udp 8767 "\xf4\xbe\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x002x\xba\x85\tTeamSpeak\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\nWindows XP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00 \x00<\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x08nickname\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" # TeamSpeak 3 # UDP login request (encrypted) # http://seclists.org/nmap-dev/2013/q3/72 udp 9987 "\x05\xca\x7f\x16\x9c\x11\xf9\x89\x00\x00\x00\x00\x02\x9d\x74\x8b\x45\xaa\x7b\xef\xb9\x9e\xfe\xad\x08\x19\xba\xcf\x41\xe0\x16\xa2\x32\x6c\xf3\xcf\xf4\x8e\x3c\x44\x83\xc8\x8d\x51\x45\x6f\x90\x95\x23\x3e\x00\x97\x2b\x1c\x71\xb2\x4e\xc0\x61\xf1\xd7\x6f\xc5\x7e\xf6\x48\x52\xbf\x82\x6a\xa2\x3b\x65\xaa\x18\x7a\x17\x38\xc3\x81\x27\xc3\x47\xfc\xa7\x35\xba\xfc\x0f\x9d\x9d\x72\x24\x9d\xfc\x02\x17\x6d\x6b\xb1\x2d\x72\xc6\xe3\x17\x1c\x95\xd9\x69\x99\x57\xce\xdd\xdf\x05\xdc\x03\x94\x56\x04\x3a\x14\xe5\xad\x9a\x2b\x14\x30\x3a\x23\xa3\x25\xad\xe8\xe6\x39\x8a\x85\x2a\xc6\xdf\xe5\x5d\x2d\xa0\x2f\x5d\x9c\xd7\x2b\x24\xfb\xb0\x9c\xc2\xba\x89\xb4\x1b\x17\xa2\xb6"