About: Nessus Attack Scripting Language     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : owl:Thing, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FNessus_Attack_Scripting_Language&invfp=IFP_OFF&sas=SAME_AS_OFF

The Nessus Attack Scripting Language, usually referred to as NASL, is a scripting language that is used by vulnerability scanners like Nessus and OpenVAS. With NASL specific attacks can be automated, based on known vulnerabilities. Tens of thousands of plugins have been written in NASL for Nessus and OpenVAS. Files that are written in this language usually get the file extension .nasl. For the exploitation of a zero day attack it is possible for an end user of Nessus or OpenVAS to write custom code in NASL which is executed by these vulnerability scanners. nasl -t 127.0.0.1 /tmp/myzeroday.nasl

AttributesValues
rdfs:label
  • Nessus Attack Scripting Language (en)
  • Nessus Attack Scripting Language (nl)
rdfs:comment
  • The Nessus Attack Scripting Language, usually referred to as NASL, is a scripting language that is used by vulnerability scanners like Nessus and OpenVAS. With NASL specific attacks can be automated, based on known vulnerabilities. Tens of thousands of plugins have been written in NASL for Nessus and OpenVAS. Files that are written in this language usually get the file extension .nasl. For the exploitation of a zero day attack it is possible for an end user of Nessus or OpenVAS to write custom code in NASL which is executed by these vulnerability scanners. nasl -t 127.0.0.1 /tmp/myzeroday.nasl (en)
  • De Nessus Attack Scripting Language, doorgaans kort weergegeven als NASL, is een formele taal die door het softwarepakket Nessus wordt gebruikt. Met Nessus kan de beveiliging van computers en netwerken worden gecontroleerd, en in deze scripttaal kunnen specifieke aanvallen worden gedefinieerd, gebaseerd op bekende kwetsbaarheden. Onder Windows kan een plugin los worden uitgevoerd met het commando nasl.exe, bijvoorbeeld zo: nasl.exe -t 127.0.0.1 "C: emp\mijnzeroday.nasl" Onder Linux kan dit gedaan worden met het nasl commando, bijvoorbeeld zo: nasl -t 127.0.0.1 /tmp/mijnzeroday.nasl (nl)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Link from a Wikipage to an external page
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • The Nessus Attack Scripting Language, usually referred to as NASL, is a scripting language that is used by vulnerability scanners like Nessus and OpenVAS. With NASL specific attacks can be automated, based on known vulnerabilities. Tens of thousands of plugins have been written in NASL for Nessus and OpenVAS. Files that are written in this language usually get the file extension .nasl. For the exploitation of a zero day attack it is possible for an end user of Nessus or OpenVAS to write custom code in NASL which is executed by these vulnerability scanners. In earlier versions of Nessus, a binary called nasl or nasl.exe was provided that could interpret NASL code to perform vulnerability scans. In later versions of Nessus, this should be done via an API that is provided by this software. An example of executing a NASL plugin 'myzeroday.nasl' on Windows, a command such as the followingcould be invoked: nasl.exe -t 127.0.0.1 "C: emp\myzeroday.nasl" An equivalent example of a Linux or UNIX command could look like this: nasl -t 127.0.0.1 /tmp/myzeroday.nasl If the plugin, in this example myzeroday.nasl, is placed in the same directory where other NASL plugins are located, it can also be included in standard scans by Nessus or OpenVAS, via the Web GUI or an API. Many of the specifications of the formal language are similar to those of the programming language C and the scripting language Perl and those of other languages. Control flow such as the for loop, the if and if-else statements are part of the language and comments are preceded by a hash. An example of "Hello World" in NASL is: display("Hello World "); In the release notes of Nessus 6.10.0 of 1/31/2017, a new NASL compiler for faster plugins was mentioned. (en)
  • De Nessus Attack Scripting Language, doorgaans kort weergegeven als NASL, is een formele taal die door het softwarepakket Nessus wordt gebruikt. Met Nessus kan de beveiliging van computers en netwerken worden gecontroleerd, en in deze scripttaal kunnen specifieke aanvallen worden gedefinieerd, gebaseerd op bekende kwetsbaarheden. Er bestaan tienduizenden plugins voor Nessus die in NASL zijn geschreven. De bestanden die in de taal zijn geschreven hebben de extensie .nasl. Voor het ontwikkelen van een zero-day attack, een computeraanval die probeert misbruik te maken van zwakke delen in software die nog onbekend zijn voor anderen of de software-ontwikkelaar, kan men zelf een dergelijke plugin in NASL schrijven. Onder Windows kan een plugin los worden uitgevoerd met het commando nasl.exe, bijvoorbeeld zo: nasl.exe -t 127.0.0.1 "C: emp\mijnzeroday.nasl" Onder Linux kan dit gedaan worden met het nasl commando, bijvoorbeeld zo: nasl -t 127.0.0.1 /tmp/mijnzeroday.nasl Als de plugin, in het voorbeeld mijnzeroday.nasl, in de map geplaatst wordt waar de andere Nessus plugins zich bevinden, kan hij ook worden meegenomen bij standaard scans van Nessus, zoals vanuit de webinterface. Veel van de specificaties van de formele taal komen overeen met die van andere scripttalen. Zo kent NASL control flow zoals de for loop, de if en if-else, en wordt commentaar voorafgegaan door een hekje. Ook OpenVAS, oorspronkelijk een aftakking van Nessus, ondersteunt NASL. (nl)
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
is Wikipage disambiguates of
is foaf:primaryTopic of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 57 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software