List comprehension one liners to extract info from nmap scans using Python and libnmap

When I perform internal penetration tests where a large number of hosts and services are involved, its useful to be able to quickly extract certain sets of information in an automated fashion from nmap scan data.  This is useful for performing automated tests against various service types, such as directory brute forcing on web servers, SSL/TLS cipher and protocol testing on SSL/TLS servers, and

This is a Security Bloggers Network syndicated blog post authored by Stephen Bradshaw. Read the original post at: The Grey Corner