Home page logo

nmap-dev logo Nmap Development mailing list archives

Re: [NSE] New script reverse-index
From: Patrik Karlsson <patrik () cqure net>
Date: Mon, 28 Nov 2011 13:18:51 +0100

On Sun, Nov 27, 2011 at 11:40 PM, David Fifield <david () bamsoftware com>wrote:

On Wed, Nov 23, 2011 at 05:19:37PM +0100, Patrik Karlsson wrote:
On Wed, Nov 23, 2011 at 1:36 AM, David Fifield <david () bamsoftware com

On Tue, Nov 22, 2011 at 09:17:31PM +0100, Patrik Karlsson wrote:

Here's an attempt on creating the reverse-index script which is in
high-priority list of the secwiki.
The script runs both as a hostrule, collecting port information for
host and storing it in the registry, and as a portrule building the
based on the collected port data.

-- |   tcp
-- |     22:
-- |     23:
-- |   udp
-- |_    5353:,,

I would prefer output like this:

-- |   tcp/22:
-- |   tcp/23:
-- |   udp/5353:,,

I wasn't sure how and if it's possible to create it as a postrule
script as the secwiki documentation suggests.

No, I don't think so. You found a nice solution.

Anyway, please let me know if it turned out as expected and whether
should go into any other categories than safe, so that it can be

Looks good. Great job!

While trying to address this I noticed something weird.
If I do the following:

  port = nmap.get_ports(host, port, "tcp", "closed")

I get ALL ports regardless of their protocol or state. Is this really
intended behavior.
According to my interpretation of the documentation I should only get
closed tcp ports, right?
Any ideas on what I need to do to fix this?

I can't reproduce this. I attached a script that has your example code.

You know what, neither can I! I'm really sorry for being an idiot.

Patrik Karlsson
Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]