Hello, some metrics, to help quantifying the work to do.
2011/11/15 Jan-Oliver Wagner <jan-oliver.wag...@greenbone.net>: > yes. At least most. Some need to split. > And we need to rework any of them a bit also. > We are indeed talking about a couple of hundred NVTs. > I can count 870 NVTs named like "*detect*.nasl", from numerous families: - Brute force attacks - FTP - Firewalls - General - Malware - Nmap NSE - Nmap NSE net - Peer-To-Peer File Sharing - RPC - Remote file access - SNMP - Service detection - Web Servers - Web application abuses -Windows As you said, some of them should be refactor to separate product and vulnerability detection. 15 of these scripts report security_holes 31 report security_warnings 825 report security_notes 4 report log_messages Regards. -- Henri Doreau | Greenbone Networks GmbH | http://www.greenbone.net Neuer Graben 17, 49074 Osnabrueck, Germany | AG Osnabrueck, HR B 202460 Executive Directors: Lukas Grunwald, Dr. Jan-Oliver Wagner _______________________________________________ Openvas-devel mailing list Openvas-devel@wald.intevation.org http://lists.wald.intevation.org/mailman/listinfo/openvas-devel