Well, if you have no insurmountable issues using the NessusWX client for
Windows, then I believe you could export to CSV and that should solve solve
the grepping issue. Hope this helps.

Michael Scott Shreve
Security Engineer / IDS/MVS Service Specialist
Direct:703.277.5900
Cell:703.475.0182
[EMAIL PROTECTED]
B172 CD76 A28C E7FD CF11  DEB8 1C2D 8FFB 6EE0 8A9E 


-----Original Message-----
From: Jason Haar [mailto:[EMAIL PROTECTED]
Sent: Sunday, February 29, 2004 4:17 PM
To: Nessus List
Subject: Is there a grepable output format?


I've been just running off a scan to see how patched our Windows boxes are,
when I realised there was no easy way to find just the boxes that weren't.
The NSR, HTML and TXT output options are all paragraph-based - which means
you have to eyeball the file looking for the vulnerable hosts.

Is there a "grepable" option? So I can go:

grep "ASN.1 Parsing" output.XXX

and see the IP addresses that rule ran against, and some form of "yes|no"
status.

(I am thinking about nmap's great "-oG" option as an example of how to do
this)

-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +64 3 9635 377 Fax: +64 3 9635 417
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to