"DePriest, Jason R." <[EMAIL PROTECTED]> writes: > If I tell nessus to scan 255 systems but scan them 12 at a time, how > hard would it be to have nessus send the request to nmap to scan all 12 > of them with a single instance of nmap and then grep the output for the > correct information?
> I can write a perl script (sorry, C is not spoken here) to do it in > under an hour. The problem is not in parsing the output: the current nmap wrapper already does this. The difficulty relies in implementing "multi host" plugins. > The interim fix is to run nmap first, then import the results into > nessus. This works. It is a kludge, but it works. Another "fix" is to run nmap without OS fingerprinting, to use much less memory. Is it so important?
