MONITOR PVM HOSTDATA
Level
pvm
History
Appears in Netasq 7.0.0
product stuffs Appears in Netasq 8.0.0
servicename Appears in Netasq 8.0.0
osname Appears in Netasq 8.0.0
service family Appears in Netasq 8.0.0
Description
Return informations, services and vulnerabilities of a host
Usage
HostId=<host_id>
Format
section_line
Returns
[Host]
hostid : id use to join this other monitor requests
addr : ip address of the host
name : name of the host
port : number of open port
product : number of product
service : number of service (product that hold an open port)
osname : operating system without version of the host
os : operating system of the host
detectedos : operating system of the host as detected by the proactive vulnerability management module
info : number of informations detected by the proactive vulnerability management module
vuln : number of vulnerabilities detected by the proactive vulnerability management module
[Product]
productname : product without version
product : product name
family : product's family id
[Service]
port : port of the service
servicename : service without version
service : service name
detectedservice : service name as detected by the proactive vulnerability management module
family : service's family id
[Info]
id : information id
name : information's name
family : information's family id
level : alarm level of the information on the host (ignore, minor or major)
port : port of the service on which the information has been found (if any)
product : product name on which the information has been found (if any)
service : service (product with an open port) name on which the information has been found (if any)
affecteddate : date when the information has been found on the host
detail : additional data (if any)
[Vuln]
id : vulnerability id
name : vulnerability's name
family : vulnerability's family id
severity : vulnerability's severity id
remote : true if the vulnerability could be exploited remotely
solution : true if the vulnerability could be corrected
level : alarm level of the vulnerability on the host (ignore, minor or major)
port : port of the service on which the vulnerability has been found (if any)
product : product name on which the vulnerability has been found (if any)
service : service (product with an open port) name on which the vulnerability has been found (if any)
affecteddate : date when the vulnerability has been found on the host
detail : additional data (if any)
Example
> MONITOR PVM HOSTDATA HostId=x
101 code=00a01000 msg="Début"
[Host]
hostid=x
addr=x
name=x
info=x
vuln=x
port=x
osname=x
os=x
detectedos=x
[Product]
productname=x product=x family=x
productname=x product=x family=x
[Service]
port=x/tcp servicename=x service=x detectedservice=x family=x
port=x/tcp servicename=x service=x detectedservice=x family=x
port=x/tcp servicename=x service=x detectedservice=x family=x
[Info]
id=x name=x family=x level=x port=x/tcp service=x detail=x
id=x name=x family=x level=x port=x/udp service=x
id=x name=x family=x level=x product=x detail=x
id=x name=x family=x level=x detail=x
[Vuln]
id=x name=x family=x severity=x remote=x solution=x level=x port=x/tcp service=x detail=x
id=x name=x family=x severity=x remote=x solution=x level=x port=x/udp service=x
id=x name=x family=x severity=x remote=x solution=x level=x product=x detail=x
id=x name=x family=x severity=x remote=x solution=x level=x detail=x
100 code=00a00100 msg="Ok"