解析Nmap以使用bash显示每个服务,然后是每个ip

时间:2018-01-24 18:27:55

标签: bash parsing scripting nmap

我需要能够显示每个服务端口打开的ips,每个服务按字母顺序列出,格式如下:

ftp
============
192.168.33.226
192.168.33.129
192.168.33.220

http-alt
============
192.168.33.243
192.168.33.252

我有一个文件,其中包含ips列表的nmap结果,如下所示:

Nmap scan report for 192.168.33.252
Host is up (0.041s latency).
Not shown: 999 filtered ports
PORT     STATE SERVICE
8000/tcp open  http-alt
MAC Address: 00:50:56:AF:1E:5B (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 2.6.34 (93%), Linux 2.6.18 (CentOS 5, x86_64, SMP) (91%), Linux 2.6.27 (91%), OpenWrt White Russian 0.9 (Linux 2.4.30) (91%), IBM System Storage DS4700 NAS device (91%), Lantronix SLC 8 terminal server (Linux 2.6) (91%), Linux 2.6.21 (91%), Linux 2.6.27 (Ubuntu 8.10) (91%), Linux 2.6.27 - 2.6.28 (91%), Linux 2.6.5 (SUSE Enterprise Server 9) (91%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop

Nmap scan report for 192.168.33.226
Host is up (0.041s latency).
Not shown: 998 filtered ports
PORT     STATE SERVICE
21/tcp   open  ftp
3389/tcp open  ms-wbt-server
MAC Address: 00:50:56:AF:4E:1D (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2000|2003|2008|XP (94%)
OS CPE: cpe:/o:microsoft:windows_2000::sp4 cpe:/o:microsoft:windows_server_2003::sp1 cpe:/o:microsoft:windows_server_2003::sp2 cpe:/o:microsoft:windows_server_2008::sp2 cpe:/o:microsoft:windows_xp::sp3
Aggressive OS guesses: Microsoft Windows 2000 SP4 (94%), Microsoft Windows Server 2003 SP1 or SP2 (91%), Microsoft Windows Server 2003 SP2 (91%), Microsoft Windows Server 2008 Enterprise SP2 (90%), Microsoft Windows 2003 SP2 (89%), Microsoft Windows XP SP3 (88%), Microsoft Windows 2000 SP0 (85%), Microsoft Windows XP (85%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop

使用grep和awk我设法将文件中的无关信息分解为每个ip,然后是运行的服务,但不知道从哪里开始。

cat /usr/share/cctc/NMAP_all_hosts.txt | grep -E "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b|\b+\/tcp\s*open" | awk '{print $NF}' 

给我以下格式:

192.168.33.249
ftp
ssh
192.168.33.236
ssh
ident
netbios-ssn
microsoft-ds

1 个答案:

答案 0 :(得分:0)

Perl最初用于改进具有高级语言功能的sed / grep / awk。

可能的Perl单线:

perl -lne '$ip=$1 if /((\d+\.){3}\d+)$/; push @{$h{$1}}, $ip if /tcp\s+open\s+(.+)$/; END { for (sort keys %h) { print"$_\n========"; print for @{$h{$_}}; print"" } }' nmap.txt

说明:

选项:-l自动换行删除/添加IO,-n将您的代码置于while (<>) { ... }循环中,-e表示以下脚本。

不需要来自cat的管道,只需添加文件作为最后一个参数。与你的grep相同。

收集散列%h中的数据,由服务名称,IP值数组寻址。

$1包含正则表达式匹配中的第一个捕获组。

使用IP地址更新匹配行上的全局变量$ip

如果遇到服务名称,请将当前$ip推送到%h哈希服务密钥下的数组。

END块在隐式循环后运行,进行打印。