Nmap Development mailing list archives
Re: Version Detection based on past TCP/UDP scan results
From: Brandon Enright <bmenrigh () ucsd edu>
Date: Fri, 1 Jun 2007 06:05:12 +0000
On Thu, 31 May 2007 15:56:05 -0500 plus or minus some time "DePriest, Jason R." <jrdepriest () gmail com> wrote:
On 5/30/07, Hyper 4S wrote:All, assuming we have the results (eg in greppable format) of a normal TCP/UDP portscan, is it possible to version scan (-sV) the found open ports, without repeating this TCP/UDP scan? E.g. we have "output", the result of the scan "nmap -sS -sU -p0-65535 -oG output [host]"
<snip>
I suppose if you are a master with sed or awk you could come up with a one linter that could use the oG file instead of the oX file. That's beyond me, though. -Jason
Here is one way to skin the cat in bash/perl: grep 'Host:' output.gnmap | \ perl -ne 'my @stack; my $host = $1 if (m#Host:\s([\d.]+)#); '\ 'while (m#(\d+)/open/tcp#g) { push @stack, $1; } '\ 'print join(",", @stack), " ", $host, "\n";' | \ while read LINE; do sudo nmap -v -n -P0 -sV -p $LINE; done This quick and dirty shell script will fire nmap off once per host in your gnmap output. You should be able to take it from there. Brandon
Attachment:
signature.asc
Description:
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Version Detection based on past TCP/UDP scan results Hyper 4S (May 31)
- Re: Version Detection based on past TCP/UDP scan results Fyodor (May 31)
- Re: Version Detection based on past TCP/UDP scan results DePriest, Jason R. (May 31)
- Re: Version Detection based on past TCP/UDP scan results Brandon Enright (May 31)