Jump to content

OpenVAS

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by WikiCleanerBot (talk | contribs) at 23:40, 1 January 2021 (v2.04b - Bot T20 CW#61 - Fix errors for CW project (Reference before punctuation)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

OpenVAS
Developer(s)Greenbone Networks GmbH
Stable release
20.8.0 / August 12, 2020[1]
Repository
Written inC
Operating systemCross-platform
TypeVulnerability scanner
LicenseGPL
Websitewww.openvas.org Edit this at Wikidata

OpenVAS (Open Vulnerability Assessment System, originally known as GNessUs) is a software framework of several services and tools offering vulnerability scanning and vulnerability management.

All OpenVAS products are free software, and most components are licensed under the GNU General Public License (GPL). Plugins for OpenVAS are written in the Nessus Attack Scripting Language, NASL.

History

OpenVAS began under the name of GNessUs, as a fork of the previously open source Nessus scanning tool, after its developers Tenable Network Security changed it to a proprietary (closed source) license in October 2005.[2] OpenVAS was originally proposed by pentesters at SecuritySpace,[3] discussed with pentesters at Portcullis Computer Security[4] and then announced[5] by Tim Brown on Slashdot.

OpenVAS is a member project of Software in the Public Interest.[6]

Structure

The OpenVAS 8 Structure

There is a daily updated feed of Network Vulnerability Tests (NVTs) - over 50,000 in total (as of July 2020).[7]

Documentation

The OpenVAS protocol structure aims to be well-documented to assist developers. The OpenVAS Compendium is a publication of the OpenVAS Project that delivers documentation on OpenVAS.

See also

References

  1. ^ "GVM 20.08 (stable, initial release 2020-08-12))". Retrieved 2020-10-11.
  2. ^ LeMay, Renai (2005-10-06). "Nessus security tool closes its source". CNet.
  3. ^ SecuritySpace
  4. ^ Portcullis Computer Security
  5. ^ Slashdot
  6. ^ Log from SPI board meeting
  7. ^ https://community.greenbone.net/t/about-greenbone-community-feed-gcf/