Reporting Functions
Once
a specific vulnerability is found, a
plug-in needs to report it to the Nessus engine. The
security_note( )
function reports a miscellaneous
issue to the user. For example, the
popserver_detect.nasl
plug-in calls security_note( )
if it detects that the remote server is running a POP3
server:
security_note(port:port, data:report);
The data
parameter accepts a string that will be
displayed to the user viewing the Nessus report after scanning is
complete. In this case, the string is stored in the variable
report
, which contains text that lets the user
know a POP3 server has been found on the target host. The function
also accepts another parameter, proto
, which
should be set to tcp
or udp
. If
proto
is not specified, tcp
is
assumed.
The security_warning( )
function is used to indicate a mild
security flaw. It accepts the same parameters as
security_note( )
. For example, the
ftp_anonymous.nasl
plug-in invokes
security_warning( )
if the target host is running
an FTP server with the anonymous
account enabled.
The security_hole( )
function is used to indicate a severe
security flaw. It also accepts the same parameters as
security_note( )
. As an example,
test-cgi.nasl
attempts to exploit a web server that
has the test-cgi CGI script installed. The
plug-in tests to see if it can exploit the
test-cgi web script to view the
host’s root directory listing. It is obvious that
such a vulnerability is a severe security flaw, so the plug-in
invokes security_hole( )
Get Network Security Tools now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.