Thank you Josh. Here is discussion from yesterday..

Yes, nmap.out is in grepable format.
The point is that I don't want to port scan with Nessus portscanner
cause it gives me false positives. That is why I want to use Nmap as
port scanner for Nessus. So the question is how to enable Nmap as port
scanner in case of yours proposed list of hosts ("single host, IP,
subnet, or comma
seperated list") with commandline nessus. 

I think we can make big contribution to the community if we clarify that
subject.

Kosta

-----Original Message-----
From: Josh Zlatin [mailto:[EMAIL PROTECTED] 
Sent: Monday, September 18, 2006 4:36 PM
To: Kostadin Kostadinov
Cc: [email protected]
Subject: Re: FW: How to use Nessus 3.0.3 (Linux) with Nmap port scanning

On Mon, 18 Sep 2006, Kostadin Kostadinov wrote:

> Thank you Josh and Patrice for the advice.
>
> Nmap.nasl is in /opt/nessus/lib/nessus/plugins and nmap is in the
PATH.
>
> I made grepable output of nmap with 'nmap -O -sS -sU -oG nmap.out [IP
> addresses]'
>
> Then feed upper result in nessus with ' nessus -V -T text -q localhost
> 1241 user/pass nmap.out scan.log '

The targets file needs to be a single host, IP, subnet, or comma
seperated list. I think the nmap.out file that you are using is not
formatted correctly.

--
  - Josh
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to