Lets say one server has hosted 2 websites using one public IP and names are one[dot]serverone[dot]com, two[dot]serverone[dot]com and all these three domain is hosted on single server with one public IP i.e. 1[dot]1[dot]1[dot]1 so if OpenVAS scanner want to target first website we should be scannig one[dot]serverone[dot]com[126.96.36.199] so it will target 188.8.131.52 server but will show vulnerability of one.serverone.com only. This will help in case of proxypass situation. If we want to scan website with pointing to actual server then we can do same as well. Do we have any provision on OpenVAS Version 7.0.3 to do same.
I’ll be waiting for your reply.
I’ve put [dot] in place of period to evade posting issues.
When choosing the category for a topic please try to have a look at the category description for each category first:
The current used category is/was https://community.greenbone.net/c/vulnerability-tests (Description: About the Vulnerability Tests category) which is about vulnerability tests (the so called “NASL scripts”).
As you’re asking a question on how the OpenVAS scanner is working which is completely unrelated to the vulnerability tests itself the category https://community.greenbone.net/c/gse (Description: About the Source Edition (GSE) category) needs to be chosen.
I have moved the topic to the correct category for now.