Date: Thu, 6 Mar 2003 19:39:12 +0200 From: Vallo Kallaste <kalts@estpak.ee> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@freebsd.org Subject: Re: network audit of sendmail Message-ID: <20030306173912.GA4030@kevad.internal> In-Reply-To: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca> References: <5.2.0.9.0.20030306094902.06e759a8@marble.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Mar 06, 2003 at 10:41:43AM -0500, Mike Tancsa <mike@sentex.net> wrote: > > I want to go through my network to a) ensure all my machines are updated > and b)look for customer machines running vulnerable versions of > sendmail. I put together a quick perl script, but its sequential and does > not scan in parallel. (this is slow for 16,000 hosts). Can anyone recommend > a tool to do this ? Essentially all I want to do is connect to port 25, > grab the banner and record it next to the IP address. Nessus seems to be > way overkill and I dont see a way in nmap to record the banner > output. Before I spend time to figure out how to use threads (or fork off > processes) in perl, am I re-inventing the wheel so to speak ? Is there a > script out there to do this ? I tried looking through google but didnt find > anything Split the whole IP range into pieces and fork off just as many workers as you want/system resources permit. In the first time I tought of forking as something messy and over my head, but it did work out within an hour or so and I didn't have any previous knowledge at all. Threading in perl is probably more hairy, but I really haven't tried myself because of no demand, so YMMV. -- Vallo Kallaste To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030306173912.GA4030>