Hi,

On 23.05.2017 10:44, margaus M. wrote:
> Hello
> 
> I want your opinion on how to structure plugins properly. What I am
> doing right now is making the following NVTs:
> -product detection NVT, where I detect the model of the product and the
> firmware version, via http or snmp. 
> 
> -second NVT which is focused on a known vulnerability, this means
> searching in the kb if there is a vulnerable model (previously known
> thanks to the first NVT), and checking if the firmware version is less
> or equal to anotherone in order to be able to say that this product is
> vulnerable.
> 
> What do you think about this squeme?

> Could it be better if I divide the
> first NVT into various NVTs? One to detect the information via http,
> anotherone to detect it via snmp, and os on? 

from my experience this is the better approach for the simple reason
that you can choose different script_require_key/script_mandatory_keys,
script_require_ports/script_require_udp_ports and script_exclude_keys
for each protocol.

Have a look at e.g. the following commit how distribute such Detections
in various NVTs and collect them at one place again:

https://lists.wald.intevation.org/pipermail/openvas-nvts-commits/2017-May/006177.html

This e.g. also helps to not report multiple vulnerabilities against a
product if you just have detected it at via two or more protocols.

> Thanks!

Regards,

--

Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone Networks GmbH | http://greenbone.net
Neumarkt 12, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-plugins mailing list
Openvas-plugins@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-plugins

Reply via email to