Web mirroring[entry]:Number of pages to mirror : <|> 20
Web mirroring[entry]:Start page : <|> /
Misc information on News server[entry]:From address : <|> Nessus <listme@listme.dsbl.org>
Misc information on News server[entry]:Test group name regex : <|> f[a-z]\.tests?
Misc information on News server[entry]:Max crosspost : <|> 7
Misc information on News server[checkbox]:Local distribution <|> yes
Misc information on News server[checkbox]:No archive <|> no
SMB use host SID to enumerate local users[entry]:Start UID : <|> 1000
SMB use host SID to enumerate local users[entry]:End UID : <|> 1200
Global variable settings[checkbox]:Enable experimental scripts <|> no
Global variable settings[checkbox]:Thorough tests (slow) <|> noCLIENT <|> PREFERENCES <|>
ntp_opt_show_end <|> yes
ntp_keep_communication_alive <|> yes
ntp_short_status <|> yes
ntp_client_accepts_notes <|> yes
ntp_escape_crlf <|> yes
email <|> root@localhost
max_threads <|> 10
log_whole_attack <|> yes
test_file <|> /etc/passwd
cgi_path <|> /cgi-bin
ping_hosts <|> yes
reverse_lookup <|> no
host_expansion <|> ip
port_range <|> 1-15000
max_hosts <|> 1
optimize_test <|> yes
language <|> english
track_iothreads <|> yes
cookie_logpipe_suptmo <|> 2
checks_read_timeout <|> 15
delay_between_tests <|> 1
ssl_version <|> none
auto_enable_dependencies <|> no
save_session <|> no
save_empty_sessions <|> no
safe_checks <|> yes
use_mac_addr <|> no
detached_scan <|> no
continuous_scan <|> no
unscanned_closed <|> no
save_knowledge_base <|> no
only_test_hosts_whose_kb_we_dont_have <|> no
only_test_hosts_whose_kb_we_have <|> no
kb_restore <|> no
kb_dont_replay_scanners <|> no
kb_dont_replay_info_gathering <|> no
kb_dont_replay_attacks <|> no
kb_dont_replay_denials <|> no
kb_max_age <|> 864000
max_checks <|> 10
non_simult_ports <|> 139, 445
plugins_timeout <|> 320
plugin_upload <|> no
plugin_upload_suffixes <|> .nasl, .inc
slice_network_addresses <|> no
detached_scan_email_address <|> 
delay_between_scan_loops <|> 
Global variable settings[radio]:Report verbosity <|> Normal
Global variable settings[radio]:Report paranoia <|> Normal
Global variable settings[radio]:Log verbosity <|> Normal
Global variable settings[entry]:Debug level <|> 0
Unknown CGIs arguments torture[checkbox]:Send POST requests <|> no
ftp writeable directories[radio]:How to check if directories are writeable : <|> Trust the permissions (drwxrwx---)
SSH settings[entry]:SSH user name : <|> root
SSH settings[password]:SSH password (unsafe!) : <|> 
SSH settings[file]:SSH public key to use : <|> 
SSH settings[file]:SSH private key to use : <|> 
SSH settings[password]:Passphrase for SSH key : <|> 
Login configurations[entry]:HTTP account : <|> 
Login configurations[password]:HTTP password (sent in clear) : <|> 
Login configurations[entry]:NNTP account : <|> 
Login configurations[password]:NNTP password (sent in clear) : <|> 
Login configurations[entry]:FTP account : <|> anonymous
Login configurations[password]:FTP password (sent in clear) : <|> nessus@nessus.org
Login configurations[entry]:FTP writeable directory : <|> /incoming
Login configurations[entry]:POP2 account : <|> 
Login configurations[password]:POP2 password (sent in clear) : <|> 
Login configurations[entry]:POP3 account : <|> 
Login configurations[password]:POP3 password (sent in clear) : <|> 
Login configurations[entry]:IMAP account : <|> 
Login configurations[password]:IMAP password (sent in clear) : <|> 
Login configurations[entry]:SMB account : <|> 
Login configurations[password]:SMB password : <|> 
Login configurations[entry]:SMB domain (optional) : <|> 
Login configurations[checkbox]:Never send SMB credentials in clear text <|> yes
Login configurations[checkbox]:Only use NTLMv2 <|> no
Login configurations[entry]:SNMP community (sent in clear) : <|> 
NIDS evasion[radio]:TCP evasion technique <|> none
NIDS evasion[checkbox]:Send fake RST when establishing a TCP connection <|> no
Brute force login (Hydra)[entry]:Number of simultaneous connections : <|> 4
Brute force login (Hydra)[file]:Logins file : <|> 
Brute force login (Hydra)[file]:Passwords file : <|> 
Brute force login (Hydra)[checkbox]:Brute force telnet <|> no
Brute force login (Hydra)[checkbox]:Brute force FTP <|> no
Brute force login (Hydra)[checkbox]:Brute force POP3 <|> no
Brute force login (Hydra)[checkbox]:Brute force IMAP <|> no
Brute force login (Hydra)[checkbox]:Brute force cisco <|> no
Brute force login (Hydra)[checkbox]:Brute force cisco-enable <|> no
Brute force login (Hydra)[checkbox]:Brute force VNC <|> no
Brute force login (Hydra)[checkbox]:Brute force SOCKS 5 <|> no
Brute force login (Hydra)[checkbox]:Brute force rexec <|> no
Brute force login (Hydra)[checkbox]:Brute force NNTP <|> no
Brute force login (Hydra)[checkbox]:Brute force HTTP <|> no
Brute force login (Hydra)[entry]:Web page to brute force : <|> 
Brute force login (Hydra)[checkbox]:Brute force ICQ <|> no
Brute force login (Hydra)[checkbox]:Brute force PCNFS <|> no
Brute force login (Hydra)[checkbox]:Brute force SMB <|> no
Brute force login (Hydra)[checkbox]:Brute force LDAP <|> no
Services[entry]:Number of connections done in parallel : <|> 5
Services[entry]:Network connection timeout : <|> 5
Services[entry]:Network read/write timeout : <|> 5
Services[entry]:Wrapped service read timeout : <|> 2
Services[file]:SSL certificate : <|> 
Services[file]:SSL private key : <|> 
Services[password]:PEM password : <|> 
Services[file]:CA file : <|> 
Services[radio]:Test SSL based services <|> All
HTTP NIDS evasion[entry]:HTTP User-Agent <|> 
HTTP NIDS evasion[checkbox]:Use HTTP HEAD instead of GET <|> no
HTTP NIDS evasion[radio]:URL encoding <|> none
HTTP NIDS evasion[radio]:Absolute URI type <|> none
HTTP NIDS evasion[radio]:Absolute URI host <|> none
HTTP NIDS evasion[checkbox]:Double slashes <|> no
HTTP NIDS evasion[radio]:Reverse traversal <|> none
HTTP NIDS evasion[checkbox]:Self-reference directories <|> no
HTTP NIDS evasion[checkbox]:Premature request ending <|> no
HTTP NIDS evasion[checkbox]:CGI.pm semicolon separator <|> no
HTTP NIDS evasion[checkbox]:Parameter hiding <|> no
HTTP NIDS evasion[checkbox]:Dos/Windows syntax <|> no
HTTP NIDS evasion[checkbox]:Null method <|> no
HTTP NIDS evasion[checkbox]:TAB separator <|> no
HTTP NIDS evasion[checkbox]:HTTP/0.9 requests <|> no
HTTP NIDS evasion[entry]:Force protocol string : <|> 
HTTP NIDS evasion[checkbox]:Random case sensitivity (Nikto only) <|> no
HTTP login page[entry]:Login page : <|> /
HTTP login page[entry]:Login form : <|> 
HTTP login page[entry]:Login form fields : <|> user=%USER%&pass=%PASS%
SMTP settings[entry]:Third party domain : <|> example.com
SMTP settings[entry]:From address : <|> nobody@example.com
SMTP settings[entry]:To address : <|> postmaster@[AUTO_REPLACED_IP]
SMB use domain SID to enumerate users[entry]:Start UID : <|> 1000
SMB use domain SID to enumerate users[entry]:End UID : <|> 1200
SMB Scope[checkbox]:Request information about the domain <|> yes
Netstat 'scanner'[checkbox]:Check found ports (intrusive) <|> no
Ping the remote host[entry]:TCP ping destination port(s) : <|> built-in
Ping the remote host[checkbox]:Do a TCP ping <|> yes
Ping the remote host[checkbox]:Do an ICMP ping <|> no
Ping the remote host[entry]:Number of retries (ICMP) : <|> 10
Ping the remote host[checkbox]:Make the dead hosts appear in the report <|> no
Ping the remote host[checkbox]:Log live hosts in the report <|> no
snmpwalk 'scanner'[entry]:Community name : <|> public
snmpwalk 'scanner'[radio]:SNMP protocol : <|> 1
snmpwalk 'scanner'[radio]:SNMP transport layer : <|> udp
snmpwalk 'scanner'[entry]:TCP/UDP port : <|> 
snmpwalk 'scanner'[entry]:Number of retries : <|> 
snmpwalk 'scanner'[entry]:Timeout between retries : <|> 
Nmap (NASL wrapper)[radio]:TCP scanning technique : <|> connect()
Nmap (NASL wrapper)[checkbox]:UDP port scan <|> no
Nmap (NASL wrapper)[checkbox]:Service scan <|> no
Nmap (NASL wrapper)[checkbox]:RPC port scan <|> no
Nmap (NASL wrapper)[checkbox]:Ping the remote host <|> no
Nmap (NASL wrapper)[checkbox]:Identify the remote OS <|> no
Nmap (NASL wrapper)[checkbox]:Use hidden option to identify the remote OS <|> no
Nmap (NASL wrapper)[checkbox]:Fragment IP packets (bypasses firewalls) <|> no
Nmap (NASL wrapper)[checkbox]:Get Identd info <|> no
Nmap (NASL wrapper)[checkbox]:Do not randomize the  order  in  which ports are scanned <|> no
Nmap (NASL wrapper)[entry]:Source port : <|> 
Nmap (NASL wrapper)[radio]:Timing policy : <|> Auto (nessus specific!)
Nmap (NASL wrapper)[entry]:Host Timeout (ms) : <|> 
Nmap (NASL wrapper)[entry]:Min RTT Timeout (ms) : <|> 
Nmap (NASL wrapper)[entry]:Max RTT Timeout (ms) : <|> 
Nmap (NASL wrapper)[entry]:Initial RTT timeout (ms) : <|> 
Nmap (NASL wrapper)[entry]:Ports scanned in parallel (max) <|> 
Nmap (NASL wrapper)[entry]:Ports scanned in parallel (min) <|> 
Nmap (NASL wrapper)[entry]:Minimum wait between probes (ms) <|> 
Nmap (NASL wrapper)[file]:File containing grepable results : <|> 
Nmap (NASL wrapper)[entry]:Data length : <|> 
<|> CLIENT
