Registrations to Open-AudIT forums are now closed. To ask any new questions please visit Opmantek Community Questions.

Open-AudIT

What's on your network?
It is currently Mon Dec 16, 2019 2:25 pm

All times are UTC + 10 hours




Forum locked This topic is locked, you cannot edit posts or make further replies.  [ 4 posts ] 
Author Message
 Post subject: Nmap.vbs script error
PostPosted: Tue Jan 16, 2007 2:31 am 
Offline
Newbie

Joined: Tue Jun 06, 2006 9:04 am
Posts: 1
Hello,

I'm trying to setup Open Audit. I had Winventory setup last year but then lost it when the computer it was on crashed. Open Audit is nicer.

But I'm having a problem with the Nmap script. I get the following error:

nmap.vbs(78,5) Microsoft VBScript runtime error: Object required: 'oAdd'

The relevant part of the script is:

Code:
Set oDoc = IE.document
set oAdd = oDoc.getElementById("add")
'    oAdd.value = oAdd.value + strText
[b]oAdd.value = strText[/b]   
IE.Document.All("submit").Click


The bolded part is line 78.

I'm not much of a vb scripter so I can't fix this error.

Any help?

Thanks.


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Tue Jan 16, 2007 6:53 pm 
Offline
Moderator
User avatar

Joined: Tue Jan 25, 2005 3:09 am
Posts: 2140
Location: Scotland
First take a look at this FAQ, and in particular the section regarding NMAP.

http://www.open-audit.org/phpbb2/viewtopic.php?t=1393

Ensure you have the latest NMAP version from..

http://www.insecure.org/nmap

If that doesn't help, make sure you are using an up to date copy of OA, and ensure that nmap is either installed in the OA scripts folder, or there is an entry in your PATH to allow you to run NMAP from any where.

Make sure NMAP is working, if you type NMAP at the command prompt you should see the namap help, something like this..

Code:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:\Documents and Settings\thisuser>nmap
Nmap 4.11 ( http://www.insecure.org/nmap )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
  Can pass hostnames, IP addresses, networks, etc.
  Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
  -iL <inputfilename>: Input from list of hosts/networks
  -iR <num hosts>: Choose random targets
  --exclude <host1[,host2][,host3],...>: Exclude hosts/networks
  --excludefile <exclude_file>: Exclude list from file
HOST DISCOVERY:
  -sL: List Scan - simply list targets to scan
  -sP: Ping Scan - go no further than determining if host is online
  -P0: Treat all hosts as online -- skip host discovery
  -PS/PA/PU [portlist]: TCP SYN/ACK or UDP discovery to given ports
  -PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
  -n/-R: Never do DNS resolution/Always resolve [default: sometimes]
  --dns-servers <serv1[,serv2],...>: Specify custom DNS servers
  --system-dns: Use OS's DNS resolver
SCAN TECHNIQUES:
  -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
  -sN/sF/sX: TCP Null, FIN, and Xmas scans
  --scanflags <flags>: Customize TCP scan flags
  -sI <zombie host[:probeport]>: Idlescan
  -sO: IP protocol scan
  -b <ftp relay host>: FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
  -p <port ranges>: Only scan specified ports
    Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080
  -F: Fast - Scan only the ports listed in the nmap-services file)
  -r: Scan ports consecutively - don't randomize
SERVICE/VERSION DETECTION:
  -sV: Probe open ports to determine service/version info
  --version-intensity <level>: Set from 0 (light) to 9 (try all probes)
  --version-light: Limit to most likely probes (intensity 2)
  --version-all: Try every single probe (intensity 9)
  --version-trace: Show detailed version scan activity (for debugging)
OS DETECTION:
  -O: Enable OS detection
  --osscan-limit: Limit OS detection to promising targets
  --osscan-guess: Guess OS more aggressively
TIMING AND PERFORMANCE:
  Options which take <time> are in milliseconds, unless you append 's'
  (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m).
  -T[0-5]: Set timing template (higher is faster)
  --min-hostgroup/max-hostgroup <size>: Parallel host scan group sizes
  --min-parallelism/max-parallelism <time>: Probe parallelization
  --min-rtt-timeout/max-rtt-timeout/initial-rtt-timeout <time>: Specifies
      probe round trip time.
  --max-retries <tries>: Caps number of port scan probe retransmissions.
  --host-timeout <time>: Give up on target after this long
  --scan-delay/--max-scan-delay <time>: Adjust delay between probes
FIREWALL/IDS EVASION AND SPOOFING:
  -f; --mtu <val>: fragment packets (optionally w/given MTU)
  -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
  -S <IP_Address>: Spoof source address
  -e <iface>: Use specified interface
  -g/--source-port <portnum>: Use given port number
  --data-length <num>: Append random data to sent packets
  --ttl <val>: Set IP time-to-live field
  --spoof-mac <mac address/prefix/vendor name>: Spoof your MAC address
  --badsum: Send packets with a bogus TCP/UDP checksum
OUTPUT:
  -oN/-oX/-oS/-oG <file>: Output scan in normal, XML, s|<rIpt kIddi3,
     and Grepable format, respectively, to the given filename.
  -oA <basename>: Output in the three major formats at once
  -v: Increase verbosity level (use twice for more effect)
  -d[level]: Set or increase debugging level (Up to 9 is meaningful)
  --packet-trace: Show all packets sent and received
  --iflist: Print host interfaces and routes (for debugging)
  --log-errors: Log errors/warnings to the normal-format output file
  --append-output: Append to rather than clobber specified output files
  --resume <filename>: Resume an aborted scan
  --stylesheet <path/URL>: XSL stylesheet to transform XML output to HTML
  --webxml: Reference stylesheet from Insecure.Org for more portable XML
  --no-stylesheet: Prevent associating of XSL stylesheet w/XML output
MISC:
  -6: Enable IPv6 scanning
  -A: Enables OS detection and Version detection
  --datadir <dirname>: Specify custom Nmap data file location
  --send-eth/--send-ip: Send using raw ethernet frames or IP packets
  --privileged: Assume that the user is fully privileged
  -V: Print version number
  -h: Print this help summary page.
EXAMPLES:
  nmap -v -A scanme.nmap.org
  nmap -v -sP 192.168.0.0/16 10.0.0.0/8
  nmap -v -iR 10000 -P0 -p 80
SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES

C:\Documents and Settings\thisuser>


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Sat Jan 20, 2007 10:39 pm 
Offline
Newbie

Joined: Sat Jan 20, 2007 10:37 pm
Posts: 7
I am having the exact same error. I have the latest nmap and can call nmap from any command line...were you able to fix this error. Is there anything else that i can try?
thanks


Top
 Profile  
Reply with quote  
 Post subject:
PostPosted: Sat Jan 20, 2007 11:18 pm 
Offline
Newbie

Joined: Sat Jan 20, 2007 10:37 pm
Posts: 7
okay i have found the problem..in the vbs script there is the section...

'nmap_subnet = "xxx.xxx.xxx." ' The subnet you wish to scan
'nmap_subnet_formatted = "xxx.xxx.xxx." ' The subnet padded with 0's
'nmap_ie_form_page = "http://lolahost.localdomain/admin_nmap_input.php"
'nmap_ie_visible = "y"
'nmap_ie_auto_close = "y"
'nmap_ip_start = 1
'nmap_ip_end = 254

i removed the leading ' from all the nmap commands and now it runs....
the only other problem is it's not telling the windows script host window "ok"...

do you have a solution for this?


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Forum locked This topic is locked, you cannot edit posts or make further replies.  [ 4 posts ] 

All times are UTC + 10 hours


Who is online

Users browsing this forum: No registered users and 5 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron
Powered by phpBB® Forum Software © phpBB Group