You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

There are a few options for subnet scanning using Nmap. Assuming you have Nmap installed on the Open-AudIT server (and if it's a Windows server, make sure you have the Nmap path in your PATH system variable) you can:

  1. Start an Nmap scan directly from the web interface via Admin -> Discovery -> Discover Subnet.
  2. Use the audit_subnet.(vbs|sh) scripts from the command line.
  3. If you're on Windows, use the audit_subnet_windows.vbs script on the command line.

For all cases you will need to supply a subnet in the standard Nmap format. One of:

  • 192.168.1.1 - single address
  • 192.168.1.0/24 - Subnet
  • 192.168.1-5.1-100 - Range

This is provided to the scripts using the command line option subnet=

Options


The command line arguments are as follows, variable [default] (valid options):

create_file [n] (y|n) - create a text file names COMPUTERNAME_YYYYMMDDHHMMSS.xml in the directory the audit script is run.

debugging [1] (0-3) - Verbosity of the output to the command line. Set to "0" for no output.

submit_online [y] (y|n) - Submit the audit result to the web server upon completion.

url [http://localhost/index.php/system] (string) - The URL of the Open-AudIT server to submit the audit to. The variable submit_online must be set to "y".

subnet [] () - As above, the subnet, range or ip address to scan.

syslog [y] (y|n) - Log to open-audit/other/open-audit.log details as script proceeds. This file is viewable in the web interface at Admin -> Logs -> View Logs.

echo_output [n] (y|n) - Upon completion echo the resulting XML to the command window.

  • No labels