Penetration Testing mailing list archives

RE: Scanning tool that will track and report diffs


From: "Van Meter, John" <John.VanMeter () ost dot gov>
Date: Fri, 27 Feb 2004 13:26:30 -0500

Foundstones, Foundscan software will do that.

Take Care and Have Fun

John van Meter

-----Original Message-----
From: Matt Bergen [mailto:MBERGE () state wy us]
Sent: Thursday, February 26, 2004 10:12 AM
To: pen-test () securityfocus com; lists () venom600 org
Subject: Re: Scanning tool that will track and report diffs


Ndiff and Nmap-Audit can be run in conjunction with Nmap to compare
results, although neither are designed to be used with a SQL server (as
far as I know). Both are linked from the related projects page of
insecure.org.

--
Matt

Ben Nelson <lists () venom600 org> 02/25/04 03:18PM >>>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm looking for a scanning tool that I can run on a regular basis
which
will: track all results in a database (optional) and report
differences
between scan runs (primary functionality I'm looking for).

I started down the road of writing a python wrapper for nmap which
used
nmap's XML result output to plug into a MySQL database.  But, I
thought
that this has got to be something that a lot of network auditors have
a
need for; which is usually a good indication that there may be a tool
that already does it.

Another bit of functionality that I think would be pretty useful is
the
ability to 'base-line' a set of systems and then notify when they
deviate from this baseline.

Any suggestions?

- --Ben
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFAPR843cL8qXKvzcwRAtvkAJ4zkrFWiDLlaLbFrvohI4IkKAwQ8ACgu1Ng
J5iMid2wbOqd02/4DuvKFkk=
=5as/
-----END PGP SIGNATURE-----

---------------------------------------------------------------------------
----------------------------------------------------------------------------


---------------------------------------------------------------------------
----------------------------------------------------------------------------

---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: