Nmap Announce mailing list archives
Skript k1dz R Us
From: Jordan Ritter <jpr5 () darkridge com>
Date: Wed, 30 Dec 1998 01:24:06 -0500 (EST)
On Tue, 29 Dec 1998, rain.forest.puppy wrote:
I like this approach, as I can first see what nmap spits out, edit it to my heart's content, and then feed it to the stub. That way you can also paste together outputs from multiple machines into one big text file, and then run the stub on that.
[...]
I've only tested this code on Intel RedHat 5.2. If it doesn't work on other platforms, sorry. If you can make it work on other platforms, even better. And if you can improve my lousy coding ('bucket-load-o-sscanfs'), great.
Far be it for me to coerce anyone out of taking the long route and writing a bunch of C code that a few lines of sed or awk can do. For the rest of you that are little script kids at heart (because c'mon, that's what the topic is), check out a little script I wrote a while back called 'warscan'. ftp://ftp.darkridge.com/pub/tools/warscan-0.7.2.tar.gz Have fun. Jordan Ritter Network Security Engineer Systems Administrator Ring-Zero, Netect, Inc. Boston, MA Darkridge Security Solutions
Current thread:
- Skript k1dz R Us Jordan Ritter (Dec 29)
- <Possible follow-ups>
- Re: Skript k1dz R Us rain.forest.puppy (Dec 31)