This is an OSP server implementation to allow GVM to remotely control the
netstat
tool.
ospd-netstat
can collect open ports on the local system.
Once running, you need to configure the Scanner for Greenbone Vulnerability Manager, for example via the web interface Greenbone Security Assistant. Then you can create scan tasks to use this scanner.
Python 3 and later is supported.
Beyond the ospd base library,
ospd-netstat
has dependencies on the following Python package:
paramiko
There are no special installation aspects for this module beyond the general installation guide for ospd-based scanners.
Please follow the general installation guide for ospd-based scanners:
https://github.com/greenbone/ospd/blob/master/doc/INSTALL-ospd-scanner.md
Starting a scan requires an SSH credential parameter because ospd-netstat
needs to login on the target systems to run the locally installed netstat
tool.
Apart from this, there are no special usage aspects for this module beyond the generic usage guide.
Please follow the general usage guide for ospd-based scanners:
https://github.com/greenbone/ospd/blob/master/doc/USAGE-ospd-scanner.md
For any question on the usage of ospd-netstat please use the Greenbone Community Portal. If you found a problem with the software, please create an issue on GitHub. If you are a Greenbone customer you may alternatively or additionally forward your issue to the Greenbone Support Portal.
This project is maintained by Greenbone Networks GmbH.
Your contributions are highly appreciated. Please create a pull request on GitHub. Bigger changes need to be discussed with the development team via the issues section at GitHub first.
Copyright (C) 2015-2018 Greenbone Networks GmbH
Licensed under the GNU General Public License v2.0 or later.