官术网_书友最值得收藏!

Comparing scan results with Ndiff

Ndiff was designed to address the issues of using diff with two XML scan results. It compares files by removing false positives and producing a more readable output, which is perfect for anyone who needs to keep a track of the scan results.

This recipe describes how to compare two Nmap scans to detect the changes in a host.

Getting ready

Ndiff requires two Nmap XML files to work, so make sure you have previously saved the scan results of the same host. If you haven't, you can always scan your own network, deactivate a service, and scan again to get these two test files. To save the results of an Nmap scan into an XML file use -oX <filename>.

How to do it...

  1. Open your terminal.
  2. Enter the following command:
    $ ndiff FILE1 FILE2
    
  3. The output returns all the differences between FILE1 and FILE2. New lines are shown after a plus sign. The lines that were removed on FILE2 are displayed after a negative sign.
    How to do it...

How it works...

Ndiff uses the first file as a base to compare against the second one. It displays the state differences for host, port, services, and OS detection.

There's more...

If you prefer Zenmap, you can use the following steps instead:

  1. Launch Zenmap.
  2. Click on Tools on the main toolbar.
  3. Click on Compare Results (Ctrl + D).
  4. Select the first file by clicking on Open in the section named A scan.
  5. Select the second file by clicking on Open in the section named B scan.
    There's more...

Output format

A human readable format is returned by default. However, Ndiff can return the differences in XML format, if preferred, by using the flag --xml.

Verbose mode

Verbose mode includes all of the information including hosts and ports that haven't changed. To use it, enter the following commands:

$ ndiff -v FILE1 FILE2
$ ndiff –verbose FILE1 FILE2 

See also

  • The Monitoring servers remotely with Nmap and Ndiff recipe
  • The Managing multiple scanning profiles with Zenmap recipe
  • The Geo-locating an IP address recipe in Chapter 3, Gathering Additional Host Information
  • The Getting information from WHOIS records recipe in Chapter 3, Gathering Additional Host Information
  • The Fingerprinting the operative system of a host recipe in Chapter 3, Gathering Additional Host Information
  • The Discovering UDP services recipe in Chapter 3, Gathering Additional Host Information
  • The Detecting possible XST vulnerabilities recipe in Chapter 4, Auditing Web Servers
主站蜘蛛池模板: 木兰县| 双鸭山市| 界首市| 吴川市| 二连浩特市| 鹿邑县| 开远市| 无锡市| 林甸县| 洪雅县| 探索| 北票市| 贺州市| 甘孜县| 报价| 舟山市| 梅河口市| 嘉祥县| 泸定县| 清河县| 西乌珠穆沁旗| 休宁县| 德化县| 和田市| 黄龙县| 任丘市| 来安县| 龙山县| 阿巴嘎旗| 时尚| 东安县| 石泉县| 赤壁市| 海宁市| 哈密市| 长沙市| 讷河市| 沛县| 石景山区| 兴义市| 如东县|