Home > Nessus > Nessus Parser v20

Nessus Parser v20

November 14th, 2013

Version 20 of the Nessus parser is here. There are a few features I am really excited about. Listed below are all the newly added features.

1. Should work with the Nessus 5.2.4. There may be some issues with this still, but the script does run. If the counts of data are off, please contact me to and send me the .nessus file and I will look at see where data is missing.

2. Fixed the port scanner & informational severities. There is a new tab for port scan results, for the WMI, NETSTAT, and Nessus port scanner.

3. Software inventory 20811, this feature is kind of kludgy, but the installed apps are in a “|” delimited field for each system identified by the plugin.

4. Port scan info, from WMI or Netstat info

5. New Tab for Plugin 54615, Device Type.

6. Added Plugin Output to Scan Info

7. Added new Plugin Families

8. Updated support for PaloAlto Audit

9. Updated Compliance Results

10. Major Revision of the vulnerability tab processing

11. Fix PCIDSS Tab Data.

parse_nessus_xml.v20a.pl

 

Categories: Nessus Tags:
  1. November 14th, 2013 at 13:28 | #1

    Thanks for the new updates! but it looks like there is some sort of error kicking back in the coding of the script. below is the command we are using and the error(similar to version 19 command attempting to parse all .nessus files in the directory)

    perl parse_nessus_xml.v20.pl -d ./
    Global symbol “$new_stuff” requires explicit package name at parse_nessus_xml.v2
    0.pl line 2660.
    Execution of parse_nessus_xml.v20.pl aborted due to compilation errors.

  2. November 14th, 2013 at 15:29 | #2

    Darnit…I am firing my QA department…wait that is me…LOL

    updated version coming

  3. November 15th, 2013 at 09:37 | #3

    lol awesome thanks for the update its working much better!!

  4. April 18th, 2014 at 18:13 | #4

    Greetings! I’ve been following your web site for some time now and finally got the bravery to go ahead
    and give you a shout out from Lubbock Tx! Just wanted to
    mention keep up the fantastic job!

  5. jsoberoi
    May 13th, 2014 at 20:19 | #5

    I am a newbee and tried to run the Perl script on Windows using Strawberry Perl but it comes back with error:

    Can’t locate XML/TreePP.pm in @INC (you may need to install the XML::TreePP modu
    le) (@INC contains: C:/strawberry/perl/lib .) at parse_nessus_xml.v20a.pl line 4.
    BEGIN failed–compilation aborted at parse_nessus_xml.v20a.pl line 4.

  6. May 14th, 2014 at 10:28 | #6

    I don’t use strawberry perl myself, but I loaded on a VM. In the program group for Strawberry, there is a folder called tools. In that folder there is a CPAN client. Load that and you will need to install all the required modules.

    XML::TreePP
    Data::Dumper
    Math::Round
    Excel::Writer::XLSX
    Data::Table
    Excel::Writer::XLSX::Chart
    Getopt::Std

    Please note the script runs better under Linux or OSX, Windows users have mentioned running out of memory when doing large data parsing.

  7. Rakesh
    August 12th, 2014 at 05:44 | #7

    Hi,

    The solution is very good, I was wondering for 2 more stuffs.

    First : Can we have “most common patch/solution” also be one output
    Second : in Critical/High/Low/Medium Datasheet, we also look for IP address’s along with Systems count Tab

  8. Rakesh
    September 26th, 2014 at 00:55 | #8

    Hi, I was checking, if in vulnerability tabs, instead of count of systems, can we have IP address printed in front of vulnerability. This will give more emphasis on report

  9. October 20th, 2014 at 20:22 | #9

    I added this to version 21

Comments are closed.