Skip to content

ospd-nmap-nse is an OSP server implementation to allow GVM to remotely control the nmap port scanner

License

Notifications You must be signed in to change notification settings

janowagner/ospd-nmap-nse

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

About OSPD-NMAP-NSE

This is an OSP server implementation to allow GVM to remotely control the nmap port scanner.

Once running, you need to configure the Scanner for Greenbone Vulnerability Manager, for example via the web interface Greenbone Security Assistant. Then you can create scan tasks to use this scanner.

OSPD-NMAP-NSE is licensed under GNU General Public License Version 2 or any later version. Please see file COPYING for details.

All parts of OSP-NMAP-NSE are Copyright (C) by Greenbone Networks GmbH (see http://www.greenbone.net).

How to start OSPD-NMAP-NSE

There are no special usage aspects for this module beyond the general usage guide.

Please follow the general usage guide for ospd-based scanners:

https://github.com/greenbone/ospd/blob/master/doc/USAGE-ospd-scanner

Starting all of the NSE scripts gainst a single host would be started like:

$ gvm-cli socket --sockpath /var/run/ospd-nmap-nse.sock --xml="<start_scan target='192.168.10.133' ports='T:1-1024'><scanner_params>0011</scanner_params></start_scan>"

Selecting a single NSE script (a VT), for example "address-info.nse":

$ gvm-cli socket --sockpath /var/run/ospd-nmap-nse.sock --xml="<start_scan target='127.0.0.1' ports='T:1-1024'><scanner_params>00address-info.nse</scanner_params></start_scan>"

About

ospd-nmap-nse is an OSP server implementation to allow GVM to remotely control the nmap port scanner

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%