Home page logo

nmap-dev logo Nmap Development mailing list archives

Re: [RFC] Output file option for capturing service and os fingerprints
From: "Michael Pattrick" <mpattrick () rhinovirus org>
Date: Thu, 19 Jun 2008 20:47:45 -0400

Hey tom,

I just noticed that Brandon already posted a script for this, but I
wrote one too! lol

It lists all unidentified OS fingerprints(or all fingerprints if the
scan was -v or -d) and all unidentified services.
It requires the latest Nmap::Parser[1] and the output is like this:

perl getOS.pl scan.xml

Unidentified service, TCP port 14334:

I hope this is what you were thinking of.


[1] http://nmapparser.wordpress.com/

On Thu, Jun 19, 2008 at 6:25 PM, Tom Sellers <nmap () fadedcode net> wrote:
I have concept for a patch that I might try my hand at writing.
Before I do this I want to make sure that the change is something
that others would find useful and has a chance of being accepted.

What I would like to do is add the ability to specify an output
file on the command line that would be used to capture service
and os fingerprints.  It would need to work in addition is any
other requested output formats.

In short what I have in mind is using a command like this:

nmap -sV -O -R -oFP fingerprints.txt --append-output
nmap -sV -O -R -oFP fingerprints.txt --append-output

The goal would be to be able to scan multiple large network segments
and then check the files for unidentified services and devices.

I have some very basic c skills and looking at the code this change
looks like something I might be able to do. For the service portion
I think most of the changes would be in the program argument handling
section in nmap.cc, the output header file, some changes around
822 in output.cc, and then making sure the file is closed properly.

Any thoughts on this?  Oh, if there is already a simple way to do
this please break out the clue stick and fill me in.



Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

Attachment: getOS.pl

Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]