"DePriest, Jason R." <[EMAIL PROTECTED]> writes:

> If I tell nessus to scan 255 systems but scan them 12 at a time, how
> hard would it be to have nessus send the request to nmap to scan all 12
> of them with a single instance of nmap and then grep the output for the
> correct information?

> I can write a perl script (sorry, C is not spoken here) to do it in
> under an hour.

The problem is not in parsing the output: the current nmap wrapper
already does this. The difficulty relies in implementing "multi host"
plugins.

> The interim fix is to run nmap first, then import the results into
> nessus.  This works.  It is a kludge, but it works.

Another "fix" is to run nmap without OS fingerprinting, to use much
less memory. Is it so important? 

Reply via email to