I've been just running off a scan to see how patched our Windows boxes are, when I realised there was no easy way to find just the boxes that weren't. The NSR, HTML and TXT output options are all paragraph-based - which means you have to eyeball the file looking for the vulnerable hosts.
Is there a "grepable" option? So I can go: grep "ASN.1 Parsing" output.XXX and see the IP addresses that rule ran against, and some form of "yes|no" status. (I am thinking about nmap's great "-oG" option as an example of how to do this) -- Cheers Jason Haar Information Security Manager, Trimble Navigation Ltd. Phone: +64 3 9635 377 Fax: +64 3 9635 417 PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1 _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
