nmap-parse-output

Converts/manipulates/extracts data from a nmap scan output.

Changelog

v1.4.4

  • Fixed bug in bash completion when installing system-wide
  • Improved documentation

Download

git clone https://github.com/ernw/nmap-parse-output.git

Examples

Write HTML output to scan.html:

$ ./nmap-parse-output scan.xml html > scan.html

Generates a list of all HTTP(s) ports:

$ ./nmap-parse-output scan.xml http-ports   
http://192.168.0.1:8081
https://192.168.0.1:8443

List all names of detected services and get a list of hosts with the port for the service http-proxy:

$ ./nmap-parse-output scan.xml service-names
http
https
http-proxy
ms-wbt-server
smtp
$ ./nmap-parse-output scan.xml service http-proxy
192.168.0.24:8085
192.168.0.25:9000

Exclude some hosts from a scan and generate a list of ports:

$ ./nmap-parse-output scan.xml exclude '192.168.1.1,192.168.1.20' | nmap-parse-output - ports
22,80,443,8080

Filter scan-all.xml to include only hosts scanned in scan-subnet.xml and write the output to filtered-scan.xml:

$ ./nmap-parse-output scan-all.xml include $(./nmap-parse-output.sh scan-subnet.xml hosts | tr "\n" ",") > filtered-scan.xml

Add comments to a scan, mark specific ports red, and generate an HTML report with the annotations:

$ ./nmap-parse-output scan.xml comment-ports '8080,10.0.20.4:443' 'this port should be filtered'
  | ./nmap-parse-output - mark-ports '8080,10.0.20.4:443' red
  | ./nmap-parse-output - comment-hosts '10.0.20.1' 'look further into this host'
  | ./nmap-parse-output - html > test.html

Remove all ports found in scan-before.xml from scan-after.xml and write the output to filtered-scan.xml

$ ./nmap-parse-output scan-after.xml exclude-ports $(./nmap-parse-output.sh scan-before.xml host-ports | tr "\n" ",") > filtered-scan.xml

Usage

Usage: ./nmap-parse-output [options]... <nmap-xml-output> <command> [command-parameters]...

Converts/manipulates/extracts data from nmap scan XML output.

Options:
  -u, --unfinished-scan			 try to read an unfinished scan output

Extract Data Commands:
  all-hosts 
        Generates a line break separated list of all hosts. Can be used to perform an additional scan on this hosts.
        Can be useful to generate a list of IPs for masscan with nmap (masscan has a more limited support for IP lists):
          nmap -Pn -n -sL -iL input.lst -oX all-ips.xml; nmap-parse-output all-ips.xml all-hosts
  banner [service-name]
        Extracts a list of all ports with a specific service (e.g. http, ms-wbt-server, smtp) in host:port format.
        Note: This command is intended for the masscan XML output only.
  blocked-ports 
        Extracts all ports in host:port format, which either admin-prohibited or tcpwrapped.
  host-ports-protocol 
        Extracts a list of all *open* ports in host:port format and marks the protocol type (tcp, udp)
  host-ports 
        Extracts a list of all *open* ports in host:port format.
  hosts-to-port [port]
        Extracts a list of all hosts that have the given port open in 'host (hostname)' format.
  hosts 
        Generates a line break separated list of all hosts with open ports. Can be used to perform an additional scan on this hosts.
  http-ports 
        Generates a line separated list of HTTP(s) all ports.
        Currently, the following services are detected as HTTP: http, https, http-alt, https-alt, http-proxy, sip, rtsp (potentially incomplete)
  http-title 
        Extracts a list of HTTP HTML titles in the following format:
        host:port	HTML title
  nmap-cmdline 
        Shows the parameters passed to nmap of the runned scan
  port-info [port]
        Extracts a list of extra information about the given port in the following format:
        port;service name;http title
  ports 
        Generates a comma-separated list of all ports. Can be used to verify if open/closed ports reachable from another host or generate port lists for specific environments. Filter closed/filtered ports.
  product 
        Extracts all detected product names.
  service-names 
        Extracts all detected service names.
  service [service-name]
        Extracts a list of all *open* ports with a specific service (e.g. http, ms-wbt-server, smtp) in host:port format.
  ssl-common-name 
        Extracts a list of TLS/SSL ports with the commonName and Subject Alternative Name in the following format:
        host:port	commonName	X509v3 Subject Alternative Name
  tls-ports 
        Extracts a list of all TLS ports in host:port format. Works only after a script scan. Can be used to do a testssl.sh scan.
        Example testssl.sh command (generates a text and HTML report for each host):
            for f in `cat ~/ssl-hosts.txt`; do ./testssl.sh --logfile ~/testssl.sh-results/$f.log --htmlfile ~/testssl.sh-results/$f.html $f; done

Manipulate Scan Commands:
  comment-hosts [hosts] [comment]
        Comments a list of hosts in scan result. Expects a comma-separated list as input. The comment will be displayed in the HTML report.
        Example:
            nmap-parse-output scan.xml comment-hosts '10.0.0.1,192.168.10.1' 'allowed services' | nmap-parse-output - html > report.html
        You can comment hosts from another scan, too:
            nmap-parse-output scan.xml comment-hosts $(./nmap-parse-output.sh scan-subnet.xml hosts | tr "\n" ",") 'this host was scanned in subnet, too.'
  comment-ports [ports] [comment]
        Comments a list of ports or hosts with port (in address:port format) in scan result. Expects a comma-separated list as input. The comment will be displayed in the HTML report.
        Example:
            nmap-parse-output scan.xml comment-ports '80,10.0.0.1:8080' 'allowed services' | nmap-parse-output - html > report.html
        You can comment services, too:
            nmap-parse-output scan.xml comment-ports $(./nmap-parse-output.sh scan.xml service http | tr "\n" ",") 'this is a http port'
  exclude-ports [ports]
        Excludes a list of ports or ports of a specific host (in address:port format) from a scan result. Expects a comma-separated list as input.
        You can pipe the output, for instance:
            nmap-parse-output scan.xml exclude '80,443,192.168.0.2:80' | nmap-parse-output - service-names
  exclude [hosts]
        Excludes a list of hosts from scan result by its IP address. Expects a comma-separated list as input.
        You can pipe the output, for instance:
            nmap-parse-output scan.xml exclude '192.168.1.1,192.168.1.20' | nmap-parse-output - service-names
  include-ports [ports]
        Filter a scan by a list of ports or ports of a specific host (in address:port format) so that only the specified ports are in the output. Expects a comma-separated list as input.
        You can pipe the output, for instance:
            nmap-parse-output scan.xml include-ports '80,443,192.168.0.2:8080' | nmap-parse-output - http-title
  include [hosts]
        Filter a scan by a list of hosts so that only the specified hosts are in the output.
        Filter a list of hosts from scan result by its IP address. Expects a comma-separated list as input.
        You can pipe the output, for instance:
            nmap-parse-output scan.xml include '192.168.1.1,192.168.1.20' | nmap-parse-output - service-names
  mark-ports [ports] [color]
        Marks a list of ports or hosts with port (in address:port format) with the given color in scan result. Expects a comma-separated list as input. The comment will be displayed in the HTML report.
        Example:
            nmap-parse-output scan.xml mark-ports '80,10.0.0.1:8080' red | nmap-parse-output - html > report.html
  reachable 
        Removes all hosts where all ports a filtered. Can be used to generate a smaller HTML report.
        Example usage to generate HTML report:
            nmap-parse-output scan.xml reachable | nmap-parse-output - html > scan.html

Convert Scan Commands:
  html-bootstrap 
        Converts the XML output into a fancy HTML report based on Bootstrap.
        Note: This HTML report requests JS/CSS libs from CDNs. However, the generated file uses the no-referrer meta tag and subresource integrity to protect the confidentiality.
  html 
        Converts a XML output into a HTML report
  to-json 
        Converts a nmap scan output to JSON

Misc Commands:

[v1.4.3]

Tutorial

Copyright (c) 2018, Sven Nobis <mail@sven.to>

Source: https://github.com/ernw/

 108 total views,  4 views today