You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Nmap_Vuln_Scanner_ServiceNow.py
+11-12
Original file line number
Diff line number
Diff line change
@@ -9,9 +9,8 @@
9
9
2. Rescanning when there are probability of missing packets
10
10
3. Checking if device is vulnerable using nmap scripts in provided file
11
11
4. Gathering more information about device using nmap script port is opened and device is vulnerable.
12
-
5. Script is checking site name from /root/script/site_lists base on discovered ip
13
-
7. After detection of vulnerable device script will check if there is ticket in SeviceNow , if not it will create new one or if ticket has been resolved it will reopen it .
14
-
8. Results are recorded in csv
12
+
5. After detection of vulnerable device script will check if there is ticket in SeviceNow , if not it will create new one or if ticket has been resolved it will reopen it .
short_describtion="Vulnerability for WannaCry for IP: "+computer_ip+" , Site: "+site_location+" , Computer Name: "+computer_hostname+" , Domain or workgoup: "+computer_domain+computer_workgroup+" , OS :"+computer_os
107
+
short_describtion="Vulnerability for WannaCry for IP: "+computer_ip+" , Computer Name: "+computer_hostname+" , Domain or workgoup: "+computer_domain+computer_workgroup+" , OS :"+computer_os
# when scanning large complex subnets, some ack can miss and it is marking open ports us filtered, need to scan againg it per ip is working fine. In normal enviroment it can be removed
0 commit comments