Nmap Development mailing list archives

Re: Feature request: scanning an AS


From: John Bond <john.r.bond () gmail com>
Date: Mon, 18 Apr 2011 21:12:56 +0200

On 15 March 2011 20:52, John Bond <john.r.bond () gmail com> wrote:
On 15 March 2011 00:13, John Bond <john.r.bond () gmail com> wrote:
On 14 March 2011 21:45, John Bond <john.r.bond () gmail com> wrote:
I noticed this script on the todo list in the wiki and i wasn't really
doing nse last year.  anyway i have written a very small script which
does this.  It relies on the whois server oliver day mentioned.  see
attached

-- @usage
-- nmap --script asn-to-prefix --script-args
asn-to-prefix.asn=65000[asn-to-prefix.whois_server=asn.shadowserver.org,asn-to-prefix.whois_port=43]
--
-- @output
-- 53/udp open  domain  udp-response
-- | asn-to-prefix:
-- |_    127.0.0.0/8

another update as per the comments on secwiki to add newtargets functionality

---
-- @args asn-to-prefix.asn The asn number to search
-- @args asn-to-prefix.whois_server whois server to use default is
asn.shadowserver.org
-- @args asn-to-prefix.whois_port whois port to conect to default is 43
-- @args newtargets prefixes discovered will be added to the nmap scan
--
-- @usage
-- nmap --script asn-to-prefix --script-args
asn-to-prefix.asn={65000,65001}[asn-to-prefix.whois_server=asn.shadowserver.org,asn-to-prefix.whois_port=43,newtargets]
--
-- @output
-- 53/udp open  domain  udp-response
-- | asn-to-prefix:
-- |_    127.0.0.0/8

I was originally skeptical about how useful this script would be but i
have been using it at least every week so look forward to seeing it in
current :)

Attachment: asn-to-prefix.nse
Description:

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

Current thread: