Hello Christian,

On Mittwoch, 24. September 2008, Christian Eric EDJENGUELE wrote:
> I'm developing the following NVT for OpenVAS,
> * MS04-022 
> * MS05-007 
> * MS05-051 
> * MS06-018 
> they are smb related vulnerabilties, but now I want to set some values in the 
> packet!
> I've seen It works very well with impacket from Core Security, using these 
> python modules: dcerpc,uuid,transport

> does openvas libraries provides an alternate method to do that ?

at a quick glance I did not find any such methods inside openvas-libraries
or openvas-libnasl.

I am currently not deep into the packet stuff. Hopefully someone else can 
answer here.
However, it sound like a good idea to provide a API for further analysis of SMB 
packets.

> if not did you consider impacket integration into openvas ? it's under apache 
> like license...

Apart from the different license ... OpenVAS so far did not incorporate Python 
modules
and I can not judge out of the box about the consequences.

If such methods do indeed make sense, it is probably best to directly integrate
them into -libraries and -libnasl. It might be an option to implement in NASL
directly, but I can not judge out of the box here.
 
> by he way, I've about 30 plugins to commit in the svn repository, but first 
> I've to make minor fix in some of them.
> you can follow my work progress, by viewing my diary at: 
> http://wald.intevation.org/developer/diary.php?diary_id=7&diary_user=3930

this looks very nice.
As discussed, you should find a way to test the scripts on your own before 
submitting.
You just need the openvas-nasl command available on any system for you.

Best

        Jan

-- 
Dr. Jan-Oliver Wagner                        Intevation GmbH, Osnabrück
Amtsgericht Osnabrück, HR B 18998             http://www.intevation.de/
Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-plugins mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-plugins

Reply via email to