28.06.2014 Views

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of Contents<br />

Chapter2. TheVulnerabilityDatabaseEditor ....................2-1<br />

Introduction . . . . . . . . . . ..........................................2-1<br />

About the Vulnerability Database . . . . . .............................2-2<br />

About Module Records . ..........................................2-3<br />

FlagsandSeveritySettings ..................................2-3<br />

Flags .................................................2-3<br />

Impact ................................................2-3<br />

RiskFactor ............................................2-4<br />

Complexity . . ..........................................2-5<br />

RootCause............................................2-6<br />

FixEase ..............................................2-6<br />

Popularity .............................................2-7<br />

ModuleDescriptions ........................................2-8<br />

ShortDescription.......................................2-8<br />

VerboseDescriptions ...................................2-8<br />

ModuleParameters .........................................2-8<br />

VulnID ................................................2-8<br />

Timeout...............................................2-8<br />

Editing Module Records ..........................................2-9<br />

Exporting Modules . . . . .........................................2-11<br />

Summary . . . . . . . . . . . . .........................................2-12<br />

Part Three: Appendices<br />

Appendix A. A <strong>Guide</strong> to CASL (Custom Audit Scripting Language) . . A-1<br />

Introduction . . . . . . . . . . ..........................................A-1<br />

About CASL . . . . . . . . . . ..........................................A-2<br />

ProgrammingWithCASL .........................................A-3<br />

StructuringCASLPrograms ..................................A-3<br />

vi<br />

Table of Contents

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!