I think you will find the following perl modules useful.
http://search.cpan.org/search?query=Nessus&mode=module
http://search.cpan.org/~jwied/Net-Nessus-0.08/lib/Net/Nessus/Client.pm

With a little bit of logic you could use the NMAP::Scanner  (or one of the others listed) modules to find the windows host and use the Nessus::Client module to scan just those hosts.  There are quite a few other NMAP and Nessus modules on CPAN and I am certain a combination of one or more of these modules and a little bit of scripting can do the job.

If you need some help with this let me know.
Jay Jacobson wrote:
Hi Jonathan. You may want to consider running nmap externally to do the
port scans and OS version detection. Then, use that output to grep out
anything non-Windows, then use the resulting data set as nmap results for
Nessus to use for scanning.

~Jay


On Thu, 1 Apr 2004, Jonathan C. Detert wrote:

  
Hello All,

I'm scanning my employer's network with the hopes of limitting viral outbreaks
by identifying vulnerable Ms.Windows machines, and denying them dhcp
service.

My problem is that my employer's network also has *BSD, MacOS, and Linux
machines, but I don't want to deny those machines dhcp service, even if
they have vulnerabilities, because I'm not worried about them spreading
virii.

If I limit the plugins used in my scans to the 'Windows' family, then I
miss some plugins that I would like to use against Ms.Windows machines,
such as 11412, which is titled 'IIS : WebDAV Overflow (MS03-007)', and
which belongs to the 'Gain root remotely' family.  But, if I enable the
'Gain root remotely' family, then I also enable plugins that would be
applicable to those o.s.'s that I don't want to scan.

So, is there a way to instruct nessus to only 'attack' hosts which it
believes are 'Ms.Win*' hosts?  Or at least, to not 'attack' hosts which
it believes are not Ms.Win* hosts?

Thanks

    

  

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to