Hello,

some metrics, to help quantifying the work to do.

2011/11/15 Jan-Oliver Wagner <jan-oliver.wag...@greenbone.net>:
> yes. At least most. Some need to split.
> And we need to rework any of them a bit also.
> We are indeed talking about a couple of hundred NVTs.
>
I can count 870 NVTs named like "*detect*.nasl", from numerous families:
  - Brute force attacks
 - FTP
 - Firewalls
 - General
 - Malware
 - Nmap NSE
 - Nmap NSE net
 - Peer-To-Peer File Sharing
 - RPC
 - Remote file access
 - SNMP
 - Service detection
 - Web Servers
 - Web application abuses
  -Windows

As you said, some of them should be refactor to separate product and
vulnerability detection.

15 of these scripts report security_holes
31 report security_warnings
825 report security_notes
4 report log_messages


Regards.

-- 
Henri Doreau |  Greenbone Networks GmbH  |  http://www.greenbone.net
Neuer Graben 17, 49074 Osnabrueck, Germany | AG Osnabrueck, HR B 202460
Executive Directors: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to