![]() |
![]()
| ![]() |
![]()
NAMEopenvas-nasl - NASL Attack Scripting Language SYNOPSISopenvas-nasl <[-Vh] [-T tracefile] [-s] [-t target] [-c config_file] [-d] [-sX] > files... DESCRIPTIONopenvas-nasl executes a set of NASL scripts against a given target host. It can also be used to determine if a NASL script has any syntax errors by running it in parse (-p) or lint (-L) mode. OPTIONS
SEE ALSOopenvas(8), openvas-nasl-lint(1) HISTORYNASL comes from a private project called 'pkt_forge', which was written in late 1998 by Renaud Deraison and which was an interactive shell to forge and send raw IP packets (this pre-dates Perl's Net::RawIP by a couple of weeks). It was then extended to do a wide range of network-related operations and integrated into the scanner as 'NASL'. The parser was completely hand-written and a pain to work with. In Mid-2002, Michel Arboi wrote a bison parser for NASL, and he and Renaud Deraison re-wrote NASL from scratch. Although the "new" NASL was nearly working as early as August 2002, Michel's laziness made us wait for early 2003 to have it working completely. After the original authors decided to stop the Open Source development in 2005, most changes and maintenance works were done by Greenbone Networks. AUTHORMost of the engine is (C) 2003 Michel Arboi, most of the built-in functions are (C) 2003 Renaud Deraison. Most new code since 2005 developed by Greenbone AG.
|