I've got a new script for you! It discovers a locally attached Sonicwall-firewall and prints some details about it. Find an example output right here:
| MAC/Serial: 0006B1001122
| IP Address: 192.168.5.1
| Subnetmask: 255.255.255.0
| Firmware: 126.96.36.199
|_ ROM: 188.8.131.52
Let me know if you should have any questions - and else, thanks for merging! ;-)
new NSE script broadcast-sonicwall-discover added
- scans the local network for available Sonicwall firewalls
Any chance on getting this merged, or are there modifications needed from my side in order to do so? Thanks!
@pfuender I'm sorry it has taken so long to get back on this. I've made a few changes to the way data is unpacked and reported, but since I don't have a sonicwall available for testing, I'd appreciate your feedback. A little back-and-forth and I'm confident we can get this included in Nmap. I've uploaded my changed version here: https://gist.github.com/dmiller-nmap/cf4f21c99300e615ce90
@dmiller-nmap No worries! Thanks for the proposal, I quickly fixed the lines for Rom and Firmware version, as well as for the modified output. So far everything looks fine.
Add broadcast-sonicwall-discover. Closes #165