#!/bin/bash # UDP Scan (using nmap) Pandora FMS Server plugin # (c) Sancho Lerena 2008-2009 # Default values PORT="" HOST="" function help { echo -e "UDP Port Plugin for Pandora FMS Plugin server. http://pandorafms.com" echo -e "Syntax:" echo -e "\t\t-p port" echo -e "\t\t-t hostname / target IP" echo -e "Samples:" echo " ./udp_nmap_plugin.sh -p 137 -t 192.168.5.20" echo "" echo -e "Please note that -p accepts nmap multiport syntax (like: 135,138,139,200-300)\n\n" exit } if [ $# -eq 0 ] then help fi # Main parsing code while getopts ":hp:t:" optname do case "$optname" in "h") help ;; "p") PORT=$OPTARG ;; "t") HOST=$OPTARG ;; ?) help ;; default) help ;; esac done if [ -z "$PORT" ] || [ -z "$HOST" ] then help fi # execution nmap -T5 -p $PORT -sU $HOST | grep open |grep -v filtered| wc -l 2> /dev/null