mailing list archives
Re: [RFC] Output file option for capturing service and os fingerprints
From: David Fifield <david () bamsoftware com>
Date: Thu, 19 Jun 2008 17:17:34 -0600
On Thu, Jun 19, 2008 at 05:25:56PM -0500, Tom Sellers wrote:
What I would like to do is add the ability to specify an output
file on the command line that would be used to capture service
and os fingerprints. It would need to work in addition is any
other requested output formats.
nmap -sV -O -R -oFP fingerprints.txt --append-output 192.168.1.1/24
nmap -sV -O -R -oFP fingerprints.txt --append-output 192.168.2.1/24
The goal would be to be able to scan multiple large network segments
and then check the files for unidentified services and devices.
Any thoughts on this? Oh, if there is already a simple way to do
this please break out the clue stick and fill me in.
OS fingerprints are in XML output if you use -v or -d. You can find them
with the XPath expression /nmaprun/host/os/osfingperint/@fingerprint.
Admittedtly it would be awkward to find just unmatched OSes, because you
would have to find hosts for which there is no osmatch element, and then
extract the fingerprint.
OS fingerprint are also in -oN output. You can just grep them out with
"^OS:". Or did you have something else in mind?
Sent through the nmap-dev mailing list
Archived at http://SecLists.Org
Re: [RFC] Output file option for capturing service and os fingerprints Tom Sellers (Jun 20)