If you had the first part setup as a python script that just outputted the
IP, you could tack on "|xargs nmap -allMyOptions " to the command where you
start that from. man xargs, yada yada; this puts the IP at the end of the
nmap command, with -allMuOptions being whatever you feel comfortable and
legal with in terms of getting the fingerprint from nmap. Just remember,
"every tool is a weapon if you hold it right" (Ani Difranco said that)...
Cheerio,
Ben
PS - those more practiced in python can surely offer a system.something call
to start nmap from python =-)
On Sat, 07 Feb 2004 19:05:14 -0800
john fleming <[EMAIL PROTECTED]> wrote:
| Bob Miller wrote:
|
| >john fleming wrote:
| >
| >
| >
| >>I prefer pyton but is there a gizmo that will translate a url into an
| >>isp so I can run nmap on it and take it's os fingerprint?
| >>
| >>
| >
| >
| >
| >>>>import socket
| >>>>socket.gethostbyname('www.microsoft.com')
| >>>>
| >>>>
| >'207.46.244.188'
| >
| >Is that what you wanted?
| >
| >
| >
| That is good but how do I get it to hand it to nmap to run the scan?
|
|
|
| _______________________________________________
| EuG-LUG mailing list
| [EMAIL PROTECTED]
| http://mailman.efn.org/cgi-bin/listinfo/eug-lug
--
_______________________________________________
EuG-LUG mailing list
[EMAIL PROTECTED]
http://mailman.efn.org/cgi-bin/listinfo/eug-lug