The Greenbone Vulnerability Management Tools or gvm-tools in short are a collection of tools that help with remote controlling a Greenbone Security Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools essentially aid accessing the communication protocols GMP (Greenbone Management Protocol) and OSP (Open Scanner Protocol).
This module is comprised of interactive and non-interactive clients. The programming language Python is supported directly for interactive scripting. But it is also possible to issue remote GMP/OSP commands without programming in Python.
The documentation for gvm-tools can be found at https://gvm-tools.readthedocs.io/. Please always take a look at the documentation for further details. This README just gives you a short overview.
See the documentation for all supported installation options.
Python 3.5 and later is supported.
You can install the latest stable release of gvm-tools from the Python Package Index using pip:
pip install --user gvm-tools
There are several clients to communicate via GMP/OSP.
All clients have the ability to build a connection in various ways:
* Unix Socket
* TLS Connection
* SSH Connection
This little tool sends plain GMP/OSP commands and prints the result to the standard output. When the program is used without any parameters, it asks for an XML command and for the user credentials.
Returns the current version.
gvm-cli socket --xml "<get_version/>"
Returns the current version using a TLS connection with certificates.
gvm-cli tls --hostname 192.168.0.10 --port 1234 --certfile '/tmp/certs/cert.pem' --keyfile '/tmp/certs/key.pem' --cafile '/tmp/certs/cert.pem' --xml "<get_version/>"
Return all tasks.
gvm-cli socket --xml "<commands><authenticate><credentials><username>myuser</username><password>mypass</password></credentials></authenticate><get_tasks/></commands>"
Reads a file with GMP commands and return the result.
gvm-cli --gmp-username foo --gmp-password socket bar < myfile.xml
Note that gvm-cli
will by default raise an exception when a command is
rejected by the server. If this kind of error handling is not desired, the
unparsed XML response can be requested using the --raw
parameter:
gvm-cli socket --raw --xml "<authenticate/>"
This tool has a lot more features than the simple gvm-cli client. You have the possibility to create your own custom gmp or osp scripts with commands from the python-gvm library and from Python 3 itself.
# Retrieve current GMP version
version = gmp.get_version()
# Prints the XML in beautiful form
from gvmtools.helper import pretty_print
pretty_print(version)
# Retrieve all tasks
tasks = gmp.get_tasks()
# Get names of tasks
task_names = tasks.xpath('task/name/text()')
pretty_print(task_names)
There is a growing collection of gmp-scripts in the "scripts/" folder. Some of them might be exactly what you need and all of them help writing your own gmp scripts.
This tool is for running gmp or osp scripts interactively. It provides the same API as gvm-script using the python-gvm library.
Connect with given credentials via a unix domain socket and open an interactive shell.
gvm-pyshell socket --gmp-username=user --gmp-password=pass -i
Connect through SSH connection and open the interactive shell.
gvm-pyshell ssh --hostname=127.0.0.1 -i
For any question on the usage of gvm-tools or gmp scripts please use the Greenbone Community Portal. If you found a problem with the software, please create an issue on GitHub.
This project is maintained by Greenbone Networks GmbH.
Your contributions are highly appreciated. Please create a pull request on GitHub. For bigger changes, please discuss it first in the issues.
For development you should use pipenv to keep you python packages separated in different environments. First install pipenv via pip
pip install --user pipenv
Afterwards run
pipenv install --dev
in the checkout directory of gvm-tools (the directory containing the Pipfile) to install all dependencies including the packages only required for development.
Copyright (C) 2017-2018 Greenbone Networks GmbH
Licensed under the GNU General Public License v3.0 or later.