Build precise queries to find exactly what you need
Press ESC to close
Join our next live webinar: “Advanced Nagios Monitoring Techniques” – Register Now
Your review has been submitted and is pending approval.
A plugin to parse data returned from a nmap scan
Current Version
0.0.4
Last Release Date
2015-03-06
Owner
Zhivko Todorov
License
GPL
Compatible With
USAGE EXAMPLES: Alowed ports are NULL: script -n /usr/bin/nmap -i 192.168.1.1 -p e More regular usage (allowed port is SSH: 22 and HTTP: 445): script -n /usr/bin/nmap -i 192.168.1.1 -p 22,445 Add custom parameters (allowed port is SSH: 22 and HTTP: 445) and exclude ports 40000-45000 from scanning: script -n /usr/bin/nmap -i 192.168.1.1 -p 22,445 -c '--exclude-ports 40000-45000'
It worked as expected. The output looks a bit weird though. I would suggest that you add a blank line at the end of it. Maybe add: print " "; to line 103 and 140? Thanks!
You must be logged in to submit a review.
To:
From: