On Dienstag, 22. Juli 2014, Pham, Tam T wrote: > My current line of work is automating security scans for printers. I am > familiar with NASL but was going to skip writing plugins in that if OVAL was > the future. I am assuming this forum will announce when we are able to > proceed with the prototype code. I am comfortable with SVN branch and trunk > development so I will keep an eye out for it.
What I learned about OVAL so far is that doing more complex vulnerability tests is getting hard if not impossible. Most OVAL content I see is about patch level testing and policies. > I have a development background in C, C++, and Python. For me installing the > development environment and stepping through the debug code is the best way > to start understanding application behaviour. Any suggestions would be > appreciated. Just solving some challenges is the best way to dive in. C and Python are the preferences of most of the active OpenVAS developers. So this matches well. -- Dr. Jan-Oliver Wagner | +49-541-335084-0 | http://www.greenbone.net/ Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG Osnabrück, HR B 202460 Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner _______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
