This is an OSP server implementation to allow GVM to remotely control the
nmap
port scanner.
Once running, you need to configure the Scanner for Greenbone Vulnerability Manager, for example via the web interface Greenbone Security Assistant. Then you can create scan tasks to use this scanner.
Python 3 and later is supported.
Beyond the ospd base library and the
nmap
tool, ospd-nmap
has no further dependencies.
There are no special installation aspects for this module beyond the general installation guide for ospd-based scanners.
Please follow the general installation guide for ospd-based scanners:
https://github.com/greenbone/ospd/blob/master/doc/INSTALL-ospd-scanner.md
For executing nmap
, a low privileged user account is sufficient for basic
operations. However, some details are only available with a high privileged
user account.
Apart from the above, are no special usage aspects for this module beyond the generic usage guide.
Please follow the general usage guide for ospd-based scanners:
https://github.com/greenbone/ospd/blob/master/doc/USAGE-ospd-scanner.md
For any question on the usage of ospd-nmap please use the Greenbone Community Portal. If you found a problem with the software, please create an issue on GitHub. If you are a Greenbone customer you may alternatively or additionally forward your issue to the Greenbone Support Portal.
This project is maintained by Greenbone Networks GmbH.
Your contributions are highly appreciated. Please create a pull request on GitHub. Bigger changes need to be discussed with the development team via the issues section at GitHub first.
Copyright (C) 2015-2018 Greenbone Networks GmbH
Licensed under the GNU General Public License v2.0 or later.