Automatically monitoring your home network
Customer Is King
If a script now wants to query the data from the last Nmap scan, it just picks them up with a normal web client. Listing 3 connects to port 9090 on the local host, picks up the JSON data, and converts it into a Perl structure with the help of the CPAN JSON
module and its from_json()
method. Then, it iterates over the included hash and array entries found there.
A brief analysis of the JSON data indicates that the hosts found by Nmap are listed under a hash entry with a host
key and that their IPv4 addresses each reside under the address
node in an entry named addr
. Listing 3 iterates over all the items found and outputs the results:
$ ./nmap-client 192.168.14.1 192.168.14.10 192.168.27.101
Listing 3
nmap-client
In other words, the scan found a total of three devices: two on the first subnet and one on the second.
Watched by Nagios
To integrate the whole enchilada into a monitoring tool like Nagios, which raises an alarm if it detects more than the expected number of nodes on the network, I now need the script in Listing 4.
It uses the CPAN Nagios::ClientStatus module, which abstracts frequently repeated tasks in Nagios scripts, such as accepting parameters or exiting the script with one of Nagios' predefined return codes. The nagios-check-nmap
script (Listing 4) expects two parameters that specify the minimum and maximum number of hosts expected to be found during the Nmap scans: --min-hosts
and --max-hosts
. If the scan drops below or exceeds the set values, the script uses exitvalue("critical")
to indicate a problem, and Nagios raises the alarm.
Listing 4
nagios-check-nmap
To add the Nagios script in Listing 4 to your Nagios configuration, you need the lines shown in Listing 5. After restarting, the Nagios daemon grabs the new configuration and calls the Nagios script at set intervals. After starting the nmap-server
daemon, the script can obtain the scan data from the daemon and then reports that everything is okay, or that a new host has entered the network.
Listing 5
nagios.cfg
This could be a newly purchased device or an intruder. Nagios notifies the user, who then needs to check what is going on and possibly increment the value set for --max-hosts
in the configuration if the new device is legitimate.
Infos
- Nmap used in the movie The Matrix: https://www.youtube.com/watch?v=0TJuipCrjZQ
- Marsh, Nicholas, Nmap Cookbook: The Fat-free Guide to Network Scanning (Kindle Edition): http://www.amazon.com/dp/B005ZK84NU
- Listings for this article: ftp://ftp.linux-magazin.com/pub/listings/magazine/169
« Previous 1 2
Buy this article as PDF
(incl. VAT)