Penetration Testing mailing list archives

Re: Scanning tool that will track and report diffs


From: cloper <cloper () crowncollege edu>
Date: Fri, 27 Feb 2004 10:40:01 -0800

I am almost finished with a utility that uses nmap that stores data in a MySQL server, should hopefully be done this weekend. Its just a small utility, not big and bulky, simply notifies if a system that was previously scanned is down, if new systems came up, and what ports have changed on the systems.

--
chris

Matt Bergen wrote:

Ndiff and Nmap-Audit can be run in conjunction with Nmap to compare
results, although neither are designed to be used with a SQL server (as
far as I know). Both are linked from the related projects page of
insecure.org.

--
Matt

Ben Nelson <lists () venom600 org> 02/25/04 03:18PM >>>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm looking for a scanning tool that I can run on a regular basis
which
will: track all results in a database (optional) and report
differences
between scan runs (primary functionality I'm looking for).

I started down the road of writing a python wrapper for nmap which
used
nmap's XML result output to plug into a MySQL database.  But, I
thought
that this has got to be something that a lot of network auditors have
a
need for; which is usually a good indication that there may be a tool
that already does it.

Another bit of functionality that I think would be pretty useful is
the
ability to 'base-line' a set of systems and then notify when they
deviate from this baseline.

Any suggestions?

- --Ben
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQFAPR843cL8qXKvzcwRAtvkAJ4zkrFWiDLlaLbFrvohI4IkKAwQ8ACgu1Ng
J5iMid2wbOqd02/4DuvKFkk=
=5as/
-----END PGP SIGNATURE-----

---------------------------------------------------------------------------
----------------------------------------------------------------------------


---------------------------------------------------------------------------
----------------------------------------------------------------------------



---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: