pandorafms/pandora_server/util/plugin/udp_nmap_plugin.sh

58 lines
918 B
Bash
Executable File

#!/bin/bash
# UDP Scan (using nmap) Pandora FMS Server plugin
# (c) Sancho Lerena 2008-2009
# Default values
PORT=""
HOST=""
function help {
echo -e "UDP Port Plugin for Pandora FMS Plugin server. http://pandorafms.com"
echo -e "Syntax:"
echo -e "\t\t-p port"
echo -e "\t\t-t hostname / target IP"
echo -e "Samples:"
echo " ./udp_nmap_plugin.sh -p 137 -t 192.168.5.20"
echo ""
echo -e "Please note that -p accepts nmap multiport syntax (like: 135,138,139,200-300)\n\n"
exit
}
if [ $# -eq 0 ]
then
help
fi
# Main parsing code
while getopts ":hp:t:" optname
do
case "$optname" in
"h")
help
;;
"p")
PORT=$OPTARG
;;
"t")
HOST=$OPTARG
;;
?)
help
;;
default)
help
;;
esac
done
if [ -z "$PORT" ] || [ -z "$HOST" ]
then
help
fi
# execution
nmap -T5 -p $PORT -sU $HOST | grep open |grep -v filtered| wc -l 2> /dev/null