ResultScraping
Jump to navigation
Jump to search
An introduction to scraping results from ipscan web sessions.
<analytics uacct="UA-27654202-1" ></analytics>
Results Scraping
Here is a simple Perl script (scrape.pl) which dumps out the open ports:
#!/usr/bin/perl
use strict;
use warnings;
use HTML::TableExtract;
my $scan = "";
{
local $/=undef;
open FILE, "ipv6.html" or die "Couldn't open ipv6 file: $!";
$scan = <FILE>;
close FILE;
}
my $te = new HTML::TableExtract();
$te->parse($scan);
# my $pingtable = $te->table(0,0);
my $porttable = $te->table(0,1);
# Currently prints out the OPEN ports
foreach my $row ($porttable->rows)
{
foreach my $ele ( @$row )
{
# Port 7 = RFSD
if (defined $ele)
{
if ($ele =~ m/Port\s+(\d+)\s+=\s+([A-Z]+)/)
{
my $port = $1;
my $state = $2;
if ($state =~ m/OPEN/)
{
printf("PORT %5d was %s\n",$port,$state);
}
}
}
}
}
Typical Scraped results
$ ./scrape.pl PORT 22 was OPEN PORT 25 was OPEN PORT 80 was OPEN PORT 443 was OPEN $
This website publishes a Privacy Policy. Continued use of this website implies your consent to the storage of data outlined in the policy.
<adsense>1</adsense>