The Greenbone Vulnerability Management Tools or gvm-tools in short are a collection of tools that help with remote controlling a Greenbone Security Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools essentially aid accessing the communication protocols GMP (Greenbone Management Protocol) and OSP (Open Scanner Protocol).
This module is comprised of interactive and non-interactive clients. The programming language Python is supported directly for interactive scripting. But it is also possible to issue remote GMP/OSP commands without programming in Python.
Python 3.5 and later is supported.
You can install the latest stable release of gvm-tools from the Python Package Index using pip:
pip install gvm-tools
alternatively download or clone this repository and install the latest development version:
pip install .
There are several clients to communicate via GMP/OSP.
All clients have the ability to build a connection in various ways:
* Unix Socket
* TLS Connection
* SSH Connection
This little tool sends plain GMP/OSP commands and prints the result to the standard output. When the program is used without any parameters, it asks for an XML command and for the user credentials.
Returns the current version.
gvm-cli socket --xml "<get_version/>"
Returns the current version using a TLS connection with certificates.
gvm-cli tls --hostname 192.168.0.10 --port 1234 --certfile '/tmp/certs/cert.pem' --keyfile '/tmp/certs/key.pem' --cafile '/tmp/certs/cert.pem' --xml "<get_version/>"
Return all tasks.
gvm-cli socket --xml "<commands><authenticate><credentials><username>myuser</username><password>mypass</password></credentials></authenticate><get_tasks/></commands>"
Reads a file with GMP commands and return the result.
gvm-cli socket --gmp-username foo --gmp-password bar < myfile.gmp
Note that gvm-cli
will by default raise an exception when a command is
rejected by the server. If this kind of error handling is not desired, the
unparsed XML response can be requested using the --raw
parameter:
gvm-cli socket --raw --xml "<authenticate/>"
This tool has a lot more features than the simple gvm-cli client. You have the possibility to create your own custom scripts with commands from the python-gvm library and from python3 itself. The scripts can be pre-loaded in the program through an additional argument.
Open script.gmp over TLS connection.
gvm-pyshell tls --hostname=127.0.0.1 script.gmp
Connect with given credentials and as unix socket. Opens an interactive shell.
gvm-pyshell socket --gmp-username=user --gmp-password=pass -i
Connect through SSH connection. Opens an interactive shell.
gvm-pyshell ssh --hostname=127.0.0.1 -i
# Retrieve current GMP version
version = gmp.get_version()
# Prints the XML in beautiful form
from gvmtools.helper import pretty_print
pretty_print(version)
# Retrieve all tasks
tasks = gmp.get_tasks()
# Get names of tasks
task_names = tasks.xpath('task/name/text()')
pretty_print(task_names)
There is a growing collection of gmp-scripts in the "scripts/" folder. Some of them might be exactly what you need and all of them help writing your own gmp scripts.
For any question on the usage of gvm-tools or gmp scripts please use the Greenbone Community Portal. If you found a problem with the software, please create an issue on GitHub.
This project is maintained by Greenbone Networks GmbH.
Your contributions are highly appreciated. Please create a pull request on GitHub. For bigger changes, please discuss it first in the issues.
For development you should use pipenv to keep you python packages separated in different environments. First install pipenv via pip
pip install --user pipenv
Afterwards run
pipenv install --dev
in the checkout directory of gvm-tools (the directory containing the Pipfile) to install all dependencies including the packages only required for development.
Copyright (C) 2017-2018 Greenbone Networks GmbH
Licensed under the GNU General Public License v3.0 or later.