I've been just running off a scan to see how patched our Windows boxes are,
when I realised there was no easy way to find just the boxes that weren't.
The NSR, HTML and TXT output options are all paragraph-based - which means
you have to eyeball the file looking for the vulnerable hosts.

Is there a "grepable" option? So I can go:

grep "ASN.1 Parsing" output.XXX

and see the IP addresses that rule ran against, and some form of "yes|no"
status.

(I am thinking about nmap's great "-oG" option as an example of how to do this)

-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to