Jump to content

OpenVAS

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 195.111.2.2 (talk) at 13:28, 18 July 2014 (know-> known. Just a typo fix). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

OpenVAS
Developer(s)Greenbone Networks GMBH
Stable release
7.0 / April 25, 2014
Repository
Operating systemCross-platform
TypeVulnerability scanner
LicenseGPL
Websitewww.openvas.org

OpenVAS (Open Vulnerability Assessment System,[1] the name of the fork originally known as GNessUs) is a framework of several services and tools offering a vulnerability scanning and vulnerability management solution.

All OpenVAS products are Free Software. Most components are licensed under the GPL.

The latest version is 7.0, released April 2014.[2]

History

OpenVas begun, under the name of GNessUs, as a fork of the previously open source Nessus scanning tool after Tenable Network Security changed it to a proprietary (closed source) license in October 2005.[3] OpenVAS was originally proposed by pentesters at Portcullis Computer Security[4] and then announced[5] by Tim Brown on Slashdot.

OpenVAS is a member project of Software in the Public Interest.[6]

Structure

The OpenVAS 4 Structure

There is a daily updated feed of Network Vulnerability Tests (NVTs) - over 35,000 in total (as of April 2014).

Documentation

The OpenVAS protocol structure is known to be well documented to assist developers. The OpenVAS Compendium is a publication of the OpenVAS Project that delivers a large amount of documentation on OpenVAS. OpenVAS Protocol Documentation OpenVAS Compendium - A Publication of The OpenVAS Project

References

  1. ^ http://www.openvas.org/
  2. ^ OpenVAS release announcement
  3. ^ LeMay, Renai (2005-10-06). "Nessus security tool closes its source". CNet.
  4. ^ Portcullis Computer Security
  5. ^ Slashdot
  6. ^ Log from SPI board meeting