Description: This video shows how to parse NMAP results using command line to find live hosts and open ports that could be used in Nessus Scans.
Commands Used:
1) cat allresults.gnmap | grep open | cut -d" " -f2 > livehosts.txt
2) cat allresults.nmap | grep open | cut -d"/" -f1 | sort -u | tr '\n' ',' > liveports.txt
I'll be doing lot more videos in the coming days. I have over 11 years of IT security experience. Please comment as to what kind of training videos you like to see from me. Though I am starting with a simple video, I can pretty much explain anything on Web Security, Network Security, Mobile, Wireless etc.
Thanks and looking forward to your comments.
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.