Penetration Testing mailing list archives

Re: custom nessus frontend


From: "Robin Wood" <dninja () gmail com>
Date: Wed, 13 Aug 2008 07:22:54 +1100

On 13/08/2008, Renaud Deraison <rderaison () tenablesecurity com> wrote:
Actually, Tenable does not prevent the creation of third party clients and
you do not need our written agreement for that. The section of the EULA
Nathaniel is referring to talks about reverse engineering the binaries or
piggy-backing on our libraries directly.

The communication protocol has not changed since Nessus 2.0. So you can use
the old protocol documentation (in the Nessus 2 download, it's in
nessus-core/doc/ntp/) and start from there.

Thanks very much. I assumed that you{d probably changed things since
the new version but I'll look through v2 docs and join the mailing
list for any questions.

I hope this clears things up,

It does.

Thanks

Robin


-- Renaud




On Aug 11, 2008, at 3:43 PM, Nathaniel Hirsch wrote:

I am not a lawyer but I think this would violate the terms of service
for Nessus.  Sections 1.4. and 1.5. of nessus's terms of service talk
about stuff like this, and it pretty much says without written consent
from tenable it isnt allowed.  So if you ask for consent and get
permission to do it, they will probably give(sell) you the API. Other
then that I dont think you can do it.
Nathaniel Hirsch, CISSP



On Sun, Aug 10, 2008 at 7:19 PM, Robin Wood <dninja () gmail com> wrote:
Hi
I'd like to have a go at writing a custom client for nessus to go with
an app I'm creating. I've been trying to find docs on how to do it, or
at least an API, but can't find anything. I assumed that as it was a
client server model that there would be some kind of published API but
I'm guessing as it is now closed source maybe there isn't.

I could use nasl and call that but I'd rather interact directly with the
server.

Can anyone point me at something I've missed or give me some pointers?

Thanks

Robin

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------





------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in 
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


Current thread: