Security Basics mailing list archives
RE: System information gathering
From: Florian Hines <panth3r () swbell net>
Date: Wed, 05 Feb 2003 11:51:21 -0600
If you can run it from a unix/linux based machine you could write a fairly simple perl or shell script to run nmap or a command line nessues client from a cronjob, have it test the machines, on the network, dump it to a txt file and compare it to other scans of the same kind when you know there wasn't any other un-authorized machines on the network. Not sure if that's what you're looking for or not. Florian -----Original Message----- From: Malin, Scott M [mailto:Scott.Malin () aetna com] Sent: Tuesday, February 04, 2003 12:22 PM To: security-basics () securityfocus com Subject: System information gathering Does anyone have suggestions of software that can do a detailed probe of a workstation or server. From time to time it's possible a system is placed on the network that isn't supposed to be there, I'd love to be able to target it and externally probe it for whatever info can be gathered. We currently have a few vulnunerability scanners but they don't return as much info as I'd like This e-mail may contain confidential or privileged information. If you think you have received this e-mail in error, please advise the sender by reply e-mail and then delete this e-mail immediately. Thank you. Aetna
Current thread:
- System information gathering Malin, Scott M (Feb 04)
- RE: System information gathering James Kelly (Feb 05)
- Re: System information gathering Pez Mohr (Feb 06)
- RE: System information gathering Florian Hines (Feb 05)
- <Possible follow-ups>
- RE: System information gathering MOHESOWA BYAS (Feb 05)
- RE: System information gathering James Kelly (Feb 05)