Well, if you have no insurmountable issues using the NessusWX client for Windows, then I believe you could export to CSV and that should solve solve the grepping issue. Hope this helps.
Michael Scott Shreve Security Engineer / IDS/MVS Service Specialist Direct:703.277.5900 Cell:703.475.0182 [EMAIL PROTECTED] B172 CD76 A28C E7FD CF11 DEB8 1C2D 8FFB 6EE0 8A9E -----Original Message----- From: Jason Haar [mailto:[EMAIL PROTECTED] Sent: Sunday, February 29, 2004 4:17 PM To: Nessus List Subject: Is there a grepable output format? I've been just running off a scan to see how patched our Windows boxes are, when I realised there was no easy way to find just the boxes that weren't. The NSR, HTML and TXT output options are all paragraph-based - which means you have to eyeball the file looking for the vulnerable hosts. Is there a "grepable" option? So I can go: grep "ASN.1 Parsing" output.XXX and see the IP addresses that rule ran against, and some form of "yes|no" status. (I am thinking about nmap's great "-oG" option as an example of how to do this) -- Cheers Jason Haar Information Security Manager, Trimble Navigation Ltd. Phone: +64 3 9635 377 Fax: +64 3 9635 417 PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1 _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
