Enumerating Niagara Fox devices
Devices using the Niagara Fox protocol usually operate on TCP ports 1911
and 4911
. They allow us to gather information remotely from them, such as application name, Java version, host OS, time zone, local IP address, and software versions involved in the stack. The fox-info
NSE script is one of the very few tools available that allow us to work with this protocol and extract this information easily.
This recipe shows you how to detect and collect information from devices using the Niagara Fox protocol with Nmap.
How to do it...
Open your terminal and enter the following Nmap command:
$ nmap -Pn -sT -p1911,4911 --script fox-info <target>
The fox-info
script will obtain device information, as shown next:
PORT STATE SERVICE 1911/tcp open niagara-fox | fox-info: fox.version: 1.0.1 | hostName: 192.168.1.128 | hostAddress: 192.168.1.128 | app.name...