Penetration Testing mailing list archives

RE: Nmap output


From: "Hasnain Atique" <hatique () hasnains com>
Date: Tue, 18 Nov 2003 20:49:43 +0800


Check out http://sourceforge.net/projects/nmapsql - I just finished a
major revision of th code. It should help you capture all your scan
results into MySQL, plus allow you to tag target hosts for easier
manipulation than by IP address.


-----Original Message-----
From: Valter Santos [mailto:vsantola () devfusion net] 
Sent: Thursday, October 30, 2003 1:35 AM
To: pen-test () securityfocus com
Subject: Re: Nmap output


Hi there,

there are a lot of perl modules that will allow you to manipulate nmap
output:

http://search.cpan.org/search?query=nmap&mode=all

for instance you can use one of them to write a perl script 
to log your scans to a database that will alow you to compare 
scans against each others.

cheers,
/valter

On Tue, 2003-10-28 at 14:43, a55mnky () yahoo com wrote:
I am in the midst of a wide scale Pentest egangement
for a client - they have 7 class C networks.  We are overwhelmed 
with the output from nmap.  Does anybody know of a tool to manage 
the output - preferably in a graphical format.  I tried the XML 
output but cannot figure out what to do with that.


-- 

---..---..---..---..---..---..---..---..---..---..---..---..----
Valter Santos
keys      @ http://devfusion.net/~vsantola/
E2A4B206  @ 99FA 3D80 4B54 BA70 7DD7 C751 47BA 49BC E2A4 B206
---------------------------------------------------------------




---------------------------------------------------------------------------
Network with over 10,000 of the brightest minds in information security
at the largest, most highly-anticipated industry event of the year.
Don't miss RSA Conference 2004! Choose from over 200 class sessions and
see demos from more than 250 industry vendors. If your job touches
security, you need to be here. Learn more or register at
http://www.securityfocus.com/sponsor/RSA_pen-test_031023
and use priority code SF4.
----------------------------------------------------------------------------


Current thread: