
Copyright © 2002-2012 Tenable Network Security, Inc.
For plugins that are written specifically to be used as part of
a dependency with another plugin, the “nooutput” keyword
will cause the PVS to not report anything for any plugin with
this keyword enabled.
This keyword will prevent a plugin from being evaluated if
another plugin has already matched. For example, it may
make sense to write a plugin that looks for a specific
anonymous FTP vulnerability, but have it disabled if another
plugin that checked for anonymous FTP had already failed.
Same as “bmatch” except for binary data on the previous side
of the reconstructed network session.
This keyword is the same as “match” but is applied against
the previous packet on the other side of the reconstructed
network session.
This option will affect the output sent to servers specified
with realtime-syslog, as well as the data in the file
specified with realtime-file. By specifying a maximum
number of bytes, the syslog message generated from the
previous sniffed packet will be truncated accordingly.
Same as “regex” except the regular expression is applied to
the previous side of the reconstructed network session.
Same as “pregex” except the pattern matching is case
insensitive.
This option will affect the output sent to servers specified
with realtime-syslog, as well as the data in the file
specified with realtime-file. By specifying a token (e.g.,
“required”), the syslog message generated from the
previous sniffed packet will be truncated from the token on.
This keyword specifies a complex regular expression search
rule that will be applied to the network session.
Same as “regex” except the pattern matching is case
insensitive.
All PVS plugins need a risk setting. Risks are classified as
LOW, MEDIUM, or HIGH. A LOW risk is an informational
vulnerability such as an active port or service. A MEDIUM risk
is something that may be exploitable or discloses information
and a HIGH risk is something that is easily exploitable.
When a specific plugin is matched, the PVS can send a TCP
reset packet to the source IP address of the matching traffic.
This can help organizations apply basic content and
application filtering to their networks.
Same as “rst-packet” except that the TCP reset packets are
sent to both the source IP and destination IP addresses.
Comentários a estes Manuais