Build precise queries to find exactly what you need
Press ESC to close
Your review has been submitted and is pending approval.
A plugin to parse data returned from a nmap scan
Current Version
0.0.4
Last Release Date
2015-03-06
Owner
Zhivko Todorov
License
GPL
Compatible With
USAGE EXAMPLES: Alowed ports are NULL: script -n /usr/bin/nmap -i 192.168.1.1 -p e
More regular usage (allowed port is SSH: 22 and HTTP: 445): script -n /usr/bin/nmap -i 192.168.1.1 -p 22,445
Add custom parameters (allowed port is SSH: 22 and HTTP: 445) and exclude ports 40000-45000 from scanning: script -n /usr/bin/nmap -i 192.168.1.1 -p 22,445 -c '--exclude-ports 40000-45000'
It worked as expected. The output looks a bit weird though. I would suggest that you add a blank line at the end of it. Maybe add: print " "; to line 103 and 140? Thanks!
You must be logged in to submit a review.
To:
From:
We’ve completely redesigned the world’s largest repository of Nagios plugins and monitoring tools. Join thousands of users sharing monitoring solutions for servers, applications, and everything in between.
Due to our redesign, all existing accounts require a password reset to access your account again.
Ready to explore 6,100+ projects and contribute to the community?
Reset Password Create Account
Happy Monitoring!