OpenVAS

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

Lua error in Module:Infobox at line 314: malformed pattern (missing ']'). OpenVAS (Open Vulnerability Assessment System,[1] the name of the fork originally known as GNessUs) is a framework of several services and tools offering a vulnerability scanning and vulnerability management solution.

All OpenVAS products are Free Software. Most components are licensed under the GPL.

The latest version is 8.0, released April 2015.[2]

History

OpenVas began, under the name of GNessUs, as a fork of the previously open source Nessus scanning tool after Tenable Network Security changed it to a proprietary (closed source) license in October 2005.[3] OpenVAS was originally proposed by pentesters at Portcullis Computer Security[4] and then announced[5] by Tim Brown on Slashdot.

OpenVAS is a member project of Software in the Public Interest.[6]

Structure

The OpenVAS 4 Structure

There is a daily updated feed of Network Vulnerability Tests (NVTs) - over 35,000 in total (as of April 2014).

Documentation

The OpenVAS protocol structure is known to be well documented to assist developers. The OpenVAS Compendium is a publication of the OpenVAS Project that delivers a large amount of documentation on OpenVAS. OpenVAS Protocol Documentation OpenVAS Compendium - A Publication of The OpenVAS Project

References

<templatestyles src="Reflist/styles.css" />

Cite error: Invalid <references> tag; parameter "group" is allowed only.

Use <references />, or <references group="..." />

External links

<templatestyles src="Asbox/styles.css"></templatestyles>

  1. http://www.openvas.org/
  2. OpenVAS release announcement
  3. Lua error in package.lua at line 80: module 'strict' not found.
  4. Portcullis Computer Security
  5. Slashdot
  6. Log from SPI board meeting