Make sure the setcap command is installed ( more information about capabilities here): sudo yum install libcapģ. In my case, this was /usr/bin/nmap: sudo chgrp adm /usr/bin/nmapĢ. Make sure that you use the right location of nmap. Restrict access to certain groups, for example adm. If you do not understand these risks, do not do this.ġ. It's possible, especially with elevated capabilities, for a clever person to use Nmap and NSE to escalate to full root privileges. The Nmap Scripting Engine (NSE) allows scripts to sniff the network, change firewall roules and interface configuration, or exploit vulnerabilities including on localhost. I think it is important to keep this security warning in mind: The linked tutorial also describes this for Ubuntu and Red Hat systems, which should be good for you since you are on CentOS. This Wiki describes pretty good how to set everything up to run it as an unprivileged user. It is possible to run nmap as non-root user.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |