Skip to content

new NSE script broadcast-sonicwall-discover#165

Closed
pfuender wants to merge 1 commit intonmap:masterfrom
pfuender:master
Closed

new NSE script broadcast-sonicwall-discover#165
pfuender wants to merge 1 commit intonmap:masterfrom
pfuender:master

Conversation

@pfuender
Copy link

Hi Guys,

I've got a new script for you! It discovers a locally attached Sonicwall-firewall and prints some details about it. Find an example output right here:

| broadcast-sonicwall-discover: 
|   MAC/Serial: 0006B1001122
|   IP Address: 192.168.5.1
|   Subnetmask: 255.255.255.0
|   Firmware: 3.9.1.2
|_  ROM: 14.0.1.1

Let me know if you should have any questions - and else, thanks for merging! ;-)

Cheers
Pfuender

- scans the local network for available Sonicwall firewalls
@jkryanchou
Copy link

👍

@pfuender
Copy link
Author

Any chance on getting this merged, or are there modifications needed from my side in order to do so? Thanks!

@dmiller-nmap
Copy link

@pfuender I'm sorry it has taken so long to get back on this. I've made a few changes to the way data is unpacked and reported, but since I don't have a sonicwall available for testing, I'd appreciate your feedback. A little back-and-forth and I'm confident we can get this included in Nmap. I've uploaded my changed version here: https://gist.github.com/dmiller-nmap/cf4f21c99300e615ce90

@pfuender
Copy link
Author

@dmiller-nmap No worries! Thanks for the proposal, I quickly fixed the lines for Rom and Firmware version, as well as for the modified output. So far everything looks fine.
https://gist.github.com/pfuender/f5487ae09b7427211c10

@nmap-bot nmap-bot closed this in 9c0a0b1 Nov 11, 2015
qha pushed a commit to qha/nmap that referenced this pull request Dec 16, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants