Network.Security.Tools [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network.Security.Tools [Electronic resources] - نسخه متنی

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید









1.11. Predefined Global Variables




This section lists global variables that
are predefined and are commonly used when writing NASL plug-ins.



Note that NASL does not forbid you from changing the value of these
variables, so be careful not to do so accidentally. For example,
trUE should always evaluate to a nonzero value,
while FALSE should always evaluate to
0.




1.11.1. TRUE and FALSE



The variable trUE evaluates to 1. The
variable FALSE evaluates to 0.



1.11.2. NULL



This variable signifies an undefined value. If
an integer variable is tested (example: i
== NULL) with
NULL, first it will be compared with
0. If a string variable is tested (example:
str == NULL) with NULL, it will
be compared with the
empty
string ".



1.11.3. Script Categories



Every
NASL plug-in needs to specify a single
category it belongs to by invoking script_category(). For example, a plug-in whose main purpose is to test a
denial-of-service vulnerability should invoke
script_category( ) as
follows:


script_category(ACT_DENIAL);


You can invoke the script_category(
)
function with any of the following
categories as the parameter:




ACT_ATTACK





This category is used by plug-ins to specify that their purpose is to
launch a vulnerability scan on a target host.





ACT_DENIAL





This category is reserved for plug-ins which perform
denial-of-service vulnerability checks against services running on
remote hosts.





ACT_DESTRUCTIVE_ATTACK





This category is used by plug-ins that attempt to scan for
vulnerabilities that might destroy data on a remote host if the
attempt succeeds.





ACT_GATHER_INFO





This category is for plug-ins whose purpose is to gather information
about a target host. For example, a plug-in that connects to port 21
of a remote host to obtain its FTP banner will be defined under this
category.





ACT_INIT





This category contains plug-ins that merely set global variables (KB
items) that are used by other plug-ins.





ACT_KILL_HIST





This category is used to define plug-ins that might crash a
vulnerable remote host or make it unstable.





ACT_MIXED_ATTACK





This category contains plug-ins which, if successful, might cause the
vulnerable remote host or its services to become unstable or crash.





ACT_SCANNER





This category contains plug-ins that perform scans such as pinging or
port scanning.





ACT_SETTINGS





This category contains plug-ins that set global variables (KB items).
These plug-ins are invoked by Nessus only when the target host is
deemed to be alive.





1.11.4. Network Encapsulation



The open_sock_tcp()
function accepts an optional parameter
called transport which you can set to indicate a
specific transport layer, which is set to
ENCAPS_IP to signify a pure TCP socket. The
following lists other types of Nessus transports you can use:




ENCAPS_SSLv23





SSL v23 connection. This allows v2 and v3 servers to specify and use
their preferred version.





ENCAPS_SSLv2





Old SSL version.





ENCAPS_SSLv3





Latest SSL version.





ENCAPS_TLSv1





TLS version 1.0.





The get_port_transport( ) function takes in a
socket number as an argument, and returns its encapsulation, which
contains one of the constants specified in the preceding list.



/ 85