Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: [RFC] Output file option for capturing service and os fingerprints
From: David Fifield <david () bamsoftware com>
Date: Thu, 19 Jun 2008 17:17:34 -0600

On Thu, Jun 19, 2008 at 05:25:56PM -0500, Tom Sellers wrote:
What I would like to do is add the ability to specify an output
file on the command line that would be used to capture service
and os fingerprints.  It would need to work in addition is any
other requested output formats.

nmap -sV -O -R -oFP fingerprints.txt --append-output 192.168.1.1/24
nmap -sV -O -R -oFP fingerprints.txt --append-output 192.168.2.1/24

The goal would be to be able to scan multiple large network segments
and then check the files for unidentified services and devices.

Any thoughts on this?  Oh, if there is already a simple way to do
this please break out the clue stick and fill me in.

OS fingerprints are in XML output if you use -v or -d. You can find them
with the XPath expression /nmaprun/host/os/osfingperint/@fingerprint.
Admittedtly it would be awkward to find just unmatched OSes, because you
would have to find hosts for which there is no osmatch element, and then
extract the fingerprint.

OS fingerprint are also in -oN output. You can just grep them out with
"^OS:". Or did you have something else in mind?

David Fifield

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault