nmap-wrapper.pl
*Faster* Scanning using Nmap...

Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

Description

Wirten by: MadHat at Unspecific.com

This wrapper will run 1 nmap scan for each IP in a range, as specified via the command line or from a file. Use the other nmap tools to generate reports on the results.

Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

Features

  • Takes a list of subnets and launches 1 nmap scan per IP
  • Parallelizes the processes to decrease scanning time.
  • Generates 1 log file per class C
  • logs can be used with the other nmap tools to generate reports on the results.
  • Works well for monitoring large networks.

Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

BUGS

  • really simple, so not a lot of options

Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

Requirements

perl (>5.6 prefered)
nmap (not needed for the program to run, but is needed to produce the searchable files)

Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

Download

nmap-wrapper.pl v1.5

Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

Output

An example of the output...




Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

Usage

$ ./nmap-wrapper.pl

 : nmap-wrapper v1.5 - MadHat (at) Unspecific.com
 : http://www.unspecific.com/

./nmap-wrapper.pl < -hav > -i  |  -l  \
         [ -n ] [-p  ] [ -o "" ] \
	 [ -L  ] [ -b  ]
         options:
  -h   help (this stuff)
  -v   verbose - will add details
  -l   network list in comma delimited form: a.b.c.d/M,e.f.g.h/x.y.z.M
  -i   input file containing network list, one network per line
  -n   max number of children to fork
  -o   nmap options to send to each child process
         it is expecting the "" around the options
         Default Options:  -O -sT -F
  -p   PID file, lists the currently running processes and their state
        default location is /usr/local/var/run/wrapper.pid
  -L   Log file dir.  This is where scan results are stored
        default location is /usr/local/var/log/nmap/
  -b   blacklist.  file that contains a list of IPs to NOT scan
        default location is /usr/local/etc/nmap/blacklist

Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License

Licensing

This product is released under the following License.

# Copyright (c) 2001-2002, MadHat (madhat@unspecific.com)
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
#
#   * Redistributions of source code must retain the above copyright
#     notice, this list of conditions and the following disclaimer.
#   * Redistributions in binary form must reproduce the above copyright
#     notice, this list of conditions and the following disclaimer in
#     the documentation and/or other materials provided with the distribution.
#   * Neither the name of MadHat Productions nor the names of its
#     contributors may be used to endorse or promote products derived
#     from this software without specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
# TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
# PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
# LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
# NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Top | Description | Features | Bugs | Requirements | Download | Output | Usage/Docs | License