Penetration Testing mailing list archives
Nmap Grepable output parsing script
From: "¨˜”°º•C0D3w@lk3r•º°”˜¨" <c0d3walk3r () gmail com>
Date: Tue, 13 Mar 2007 01:48:54 +0530
Hi All, Following is a rough Ruby script I wrote to parse the Nmap Grepable output. I've not tested it thoroughly and I know that it may be buggy ;) ..... but it worked on whatever files I tried on. Currenty it parses the given file and lists all the host IPs and all requested ports (ie: open, filtered or closed). Read the Usage If anyone knows good info on how to work with nmap grepable output files do let me know. Those who want to extract info from nmap xml output can check out the tool "xmlstarlet" BTW here is the script http://rubyforge.org/snippet/download.php?type=snippet&id=205 Manish S. Saindane -- ¨˜"°º•C0D3w@lk3r•º°"˜¨ ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- Nmap Grepable output parsing script ¨˜”°º•C0D3w@lk3r•º°”˜¨ (Mar 13)
- Re: Nmap Grepable output parsing script Buz Dale (Mar 18)