Maybe I am stupid, but where is “scan config” Von: [email protected] [mailto:[email protected]] Im Auftrag von Eero Volotinen Gesendet: Mittwoch, 28. Oktober 2015 10:58 An: Helms, Michael - WVI GmbH Cc: [email protected] Betreff: Re: [Openvas-discuss] Not all vulnarabitities used
You need to enable it on scan config, not on openvassd.conf Eero 28.10.2015 11.56 ap. "Helms, Michael - WVI GmbH" <[email protected] <mailto:[email protected]> > kirjoitti: I have tried "log_whole_attack" in /etc/openvas/openvassd.conf --- snip --- nasl_no_signature_check = yes log_whole_attack = yes log_plugins_name_at_load = yes --- snap --- And then service openvas-scanner restart. In /var/log/openvassd.messages I get --- snip --- Loading 2015/gb_adobe_reader_mult_vuln01_oct15_win.nasl --- snap --- And after start a task --- snip --- [Wed Oct 28 09:37:14 2015][29571] Starts a new scan. Target(s) : hel-wvi.wvi.lan, with max_hosts = 30 and max_checks = 10 [Wed Oct 28 09:37:14 2015][29571] exclude_hosts: Skipped 0 host(s). [Wed Oct 28 09:37:14 2015][29571] Testing hel-wvi.wvi.lan (192.168.1.121) [29584] [Wed Oct 28 09:37:42 2015][29813] open_sock_tcp: 192.168.1.121:15 <http://192.168.1.121:15> time-out. [Wed Oct 28 09:38:21 2015][29874] win_cmd_exec: WinCMD Connect failed [Wed Oct 28 09:38:40 2015][29972] [29972](:0) Negative integer index are not supported yet! [Wed Oct 28 09:38:40 2015][29972] [29972](/var/lib/openvas/plugins/smb_enum_services.nasl:0) ord() usage : ord(char) [Wed Oct 28 09:38:40 2015][29972] [29972](:0) Negative integer index are not supported yet! [Wed Oct 28 09:38:40 2015][29972] [29972](/var/lib/openvas/plugins/smb_enum_services.nasl:0) ord() usage : ord(char) [Wed Oct 28 09:38:40 2015][29972] [29972](:0) Negative integer index are not supported yet! [Wed Oct 28 09:38:40 2015][29972] [29972](/var/lib/openvas/plugins/smb_enum_services.nasl:0) ord() usage : ord(char) [Wed Oct 28 09:38:40 2015][29972] [29972](:0) Negative integer index are not supported yet! [Wed Oct 28 09:38:40 2015][29972] [29972](/var/lib/openvas/plugins/smb_enum_services.nasl:0) ord() usage : ord(char) [Wed Oct 28 09:39:30 2015][30560] [30560](/var/lib/openvas/plugins/2012/secpod_ms11-020_remote.nasl:0) Usage: substr(string, idx_start [,idx_end]) [Wed Oct 28 09:39:33 2015][30513] open_sock_tcp: 192.168.1.121:8080 <http://192.168.1.121:8080> time-out. [Wed Oct 28 09:40:01 2015][29584] Finished testing 192.168.1.121. Time : 166.39 secs [Wed Oct 28 09:40:01 2015][29571] Test complete [Wed Oct 28 09:40:01 2015][29571] Total time to scan all hosts : 177 seconds --- snap --- Hm, that's not what I expected. I thought, I get tons of infos. What is wrong? > -----Ursprüngliche Nachricht----- > Von: Openvas-discuss [mailto:openvas-discuss- <mailto:openvas-discuss-> > [email protected] <mailto:[email protected]> ] Im Auftrag > von Chris > Gesendet: Dienstag, 27. Oktober 2015 17:23 > An: [email protected] > <mailto:[email protected]> > Betreff: Re: [Openvas-discuss] Not all vulnarabitities used > > Hi, > > >Is it possible to increase the log level, to see which nvt where used? > >Something like what you can see, if you use "ps afx" if a task run. > > there is the scan config option "log_whole_attack" which logs all NVTs > and the reasons why those where not executed. > _______________________________________________ > Openvas-discuss mailing list > [email protected] > <mailto:[email protected]> > https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas- > discuss _______________________________________________ Openvas-discuss mailing list [email protected] <mailto:[email protected]> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
_______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
