Excellent! I'll give it a shot!
Thomas Reinke wrote: > Shawn Duffy wrote: >> Thanks Thomas. I'll continue testing... >> >> One other question though... To help me limit the loaded plugins used >> for the scans... >> >> The client can send the list of plugins it would like to use. I'm >> assuming this is done with >> >> CLIENT <|> PREFERENCES <|> >> plugin_set <|> ... >> >> What is the syntax for the plugin_set pref? Is it a comma-delimited >> list of OIDs? Or do I send a separate plugin_set pref for every >> plugin such as: >> >> plugin_set <|> 12345 >> plugin_set <|> 12346 > > The answer you're looking for is (I believe) a semi-colon delimited > list of plugin IDs (not OIDs). See below. > > A client side session trace might look as follows: > > < OTP/1.0 > > DAEMONUSERID > DAEMONPASSWORD > CLIENT <|> PREFERENCES <|> > SSH settings[password]:SSH password (unsafe!) : <|> YOUR_SYSTEM_PASSWORD > Nmap[radio]:Port range <|> 22-22 > Ping the remote host[checkbox]:Do a TCP ping <|> no > Ping the remote host[checkbox]:Log live hosts in the report <|> yes > port_range <|> 22-22 > plugin_set <|> 14273;10180;10335;10330;50282 > <|> CLIENT > CLIENT <|> LONG_ATTACK <|> > 13 > 192.168.10.10 > > _______________________________________________ Openvas-discuss mailing list [email protected] http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
