Excellent!  I'll give it a shot!

Thomas Reinke wrote:
> Shawn Duffy wrote:
>> Thanks Thomas.  I'll continue testing...
>>
>> One other question though...  To help me limit the loaded plugins used 
>> for the scans...
>>
>> The client can send the list of plugins it would like to use.  I'm 
>> assuming this is done with
>>
>> CLIENT <|> PREFERENCES <|>
>> plugin_set <|> ...
>>
>> What is the syntax for the plugin_set pref?  Is it a comma-delimited 
>> list of OIDs?  Or do I send a separate plugin_set pref for every 
>> plugin such as:
>>
>> plugin_set <|> 12345
>> plugin_set <|> 12346
> 
> The answer you're looking for is (I believe) a semi-colon delimited
> list of plugin IDs (not OIDs).  See below.
> 
> A client side session trace might look as follows:
> 
> < OTP/1.0 >
> DAEMONUSERID
> DAEMONPASSWORD
> CLIENT <|> PREFERENCES <|>
> SSH settings[password]:SSH password (unsafe!) : <|> YOUR_SYSTEM_PASSWORD
> Nmap[radio]:Port range <|> 22-22
> Ping the remote host[checkbox]:Do a TCP ping <|> no
> Ping the remote host[checkbox]:Log live hosts in the report <|> yes
> port_range <|> 22-22
> plugin_set <|> 14273;10180;10335;10330;50282
> <|> CLIENT
> CLIENT <|> LONG_ATTACK <|>
> 13
> 192.168.10.10
> 
> 
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss

Reply via email to