http://search.cpan.org/search?query=Nessus&mode=module
http://search.cpan.org/~jwied/Net-Nessus-0.08/lib/Net/Nessus/Client.pm
With a little bit of logic you could use the NMAP::Scanner (or one of the others listed) modules to find the windows host and use the Nessus::Client module to scan just those hosts. There are quite a few other NMAP and Nessus modules on CPAN and I am certain a combination of one or more of these modules and a little bit of scripting can do the job.
If you need some help with this let me know.
Jay Jacobson wrote:
Hi Jonathan. You may want to consider running nmap externally to do the port scans and OS version detection. Then, use that output to grep out anything non-Windows, then use the resulting data set as nmap results for Nessus to use for scanning.~Jay On Thu, 1 Apr 2004, Jonathan C. Detert wrote:Hello All, I'm scanning my employer's network with the hopes of limitting viral outbreaks by identifying vulnerable Ms.Windows machines, and denying them dhcp service. My problem is that my employer's network also has *BSD, MacOS, and Linux machines, but I don't want to deny those machines dhcp service, even if they have vulnerabilities, because I'm not worried about them spreading virii. If I limit the plugins used in my scans to the 'Windows' family, then I miss some plugins that I would like to use against Ms.Windows machines, such as 11412, which is titled 'IIS : WebDAV Overflow (MS03-007)', and which belongs to the 'Gain root remotely' family. But, if I enable the 'Gain root remotely' family, then I also enable plugins that would be applicable to those o.s.'s that I don't want to scan. So, is there a way to instruct nessus to only 'attack' hosts which it believes are 'Ms.Win*' hosts? Or at least, to not 'attack' hosts which it believes are not Ms.Win* hosts? Thanks
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
