First of all an introduction.

My name is Thomas Olofsson (skjortan) on efnet. and has been working
with network and application security for the past ten years.
I did use nessus from time to time up till the 2.x release. and before
then i used s.a.t.a.n. Currently i am mostly working with pure
application/code security and do not do much network scans other then
as a part test for some PCI compliance evaluation.

I was very happy when i read about the OpenVas project and i have
synced the repository and almost gotten it to build. I must say that i
am very impressed with the amount of work you guys have done so far.
Especially with all the licensing issues. It is really nice to see a
working Open branch again.

I am very much looking forward to contibute to this project that i
really think is helping the both the security and the open source
comunity.

I was also happy to find a very active and living mailinglist that
actually very openly discuss the development roadmap:

Now to my thoughts on the last days discussions regarding external .sig formats.

Start with .nasl and do them good. It is allways tempting to get input
from other sources but the build is not even stable yet. I think we
should start with a stable platform that builds on anything, with
working .nasl scripts for the most obvious things (windows/smb) and
major vendor network services.

There is a lot of job just getting up an running, producing decent
scan results.

> hm, this would turn OpenVAS into a cracker tool.
> We have to be careful with this. OpenVAS should
> stay a analysis tool. Though it might make sense to
> use metasploit in some ways to report security problems
> rather to pop up a root shell.

I agree to this. a security scanner should be a security scanner and a
exploit framework a exploit framework.

If you are a decent penetration tester you should know how to exploit
your findings with metasploit. If we integrate them we risk turning
this into a 'script kiddie' toolbox. And thereby taking focus from
what we really should do (finding vulnerabilities).
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to