Solved

Automated Portscan for several Hosted Systems

Posted on 2013-10-31
3
279 Views
Last Modified: 2013-11-05
Hello everybody,

we are searching for an automated solution to check our different hosted systems for open ports. It would be perfect if the solution could send a regular report whit a list of open ports per system.
Furthermore it would of course be desirable if the costs for the solution would be as small as possible.
We are grateful for any helpful suggestion.

Best regards
David
0
Comment
Question by:Systemadministration
3 Comments
 
LVL 7

Accepted Solution

by:
expert1010 earned 350 total points
ID: 39616113
Hi David,

I suggest nmap. I use it all the time for such things. Make a shell script and run it with cron. Smaller cost than that you'll hardly find, just 30 minutes of your time.

Here is an example.
http://www.mariusv.com/automate-your-nmap-scans/

If you want a full portscan ie. all ports change the row:
      nmap -n -sS $network -oG $DIR/$network.$TODAY.nmap

to
nmap -n -p1-65535 -sS $network -oG $DIR/$network.$TODAY.nmap

And change the email adress to your email.

See "man nmap" or this link for further examples.
http://nmap.org/book/man-examples.html
0
 
LVL 61

Assisted Solution

by:btan
btan earned 150 total points
ID: 39616795
Also suggest you see

a) Mapping networks using Zenmap profiles - the clip some idea and visual aspect in the mapping. also nmap based too.

http://searchsecurity.techtarget.com/video/Zenmap-tutorial-Mapping-networks-using-Zenmap-profiles
http://www.linux.com/learn/tutorials/381794-audit-your-network-with-zenmap

b) OpenVAS (open) and Nessus (commerical) - The former is a fork from the last free version of Nessus that went proprietary in 2005. OpenVAS plugins are still written in the Nessus NASL language. Actually Metasploit community (or Nexpose - commerical) is another worth checking. Below is a comparsion to give some sense on scan capbility and scope

http://hackertarget.com/nessus-openvas-nexpose-vs-metasploitable/

Actually it will be better to go targeted as scanner specific to web has a couple few more like Zap proxy, skipfish, Arachni etc (for OWASP top 10) or server application specific.  The pentesting standard has good material to consider, thought you may be only doing part of the vulnerability scan, that is the next logical step after the vulnerability scan.

http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Automated_Tools

Intelligence gathering make sense as overall ..

http://www.pentest-standard.org/index.php/Intelligence_Gathering
0
 

Author Closing Comment

by:Systemadministration
ID: 39623875
Thanks everybody for the fine input. I guess we will build a solution using nmap.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
IPS/IDS 6 77
asa failover 3 37
Telco & Point to Point Internet VPN 3 18
route 2 traffic streams on single NIC 6 11
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now