Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

OpenVAS 8

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3
At a glance
Powered by AI
The key takeaways are that vulnerability scanning is crucial for penetration testing and OpenVAS 8.0 is packaged for Kali Linux to perform vulnerability scans. OpenVAS must be installed and configured using the openvas-setup command which downloads rules and creates services.

The steps required to set up OpenVAS on Kali Linux are to update Kali, install OpenVAS, run openvas-setup to download rules and create services, and check that the OpenVAS services are listening using netstat.

The OpenVAS services can be started by running the openvas-start command which will start the manager, scanner, and web interface services.

10/20/2017 OpenVAS 8.

0 Vulnerability Scanning | Kali Linux

OpenVAS 8.0 Vulnerability Scanning


April 27, 2015 muts Penetration Testing

Vulnerability scanning is a crucial phase of a penetration test and having an updated vulnerability scanner in your
security toolkit can often make a realdi erence by helping you discover overlooked vulnerable items. For this reason,
weve manually packaged the latest and newly released OpenVAS 8.0 tool and libraries for Kali Linux. Although nothing
major has changed in this release in terms of running the vulnerability scanner, we wanted to give a quick overview on
how to get itup and running.

Setting up Kali for Vulnerability Scanning


If you havent already, make sure your Kali is up-to-date and install the latest OpenVAS. Once done, run the openvas-
setup command to setup OpenVAS, download the latest rules, create an admin user, and start up the various services.
Depending on your bandwidth and computer resources, this could take a while.

root@kali:~# apt-get update


root@kali:~# apt-get dist-upgrade

root@kali:~# apt-get install openvas


root@kali:~# openvas-setup
/var/lib/openvas/private/CA created
/var/lib/openvas/CA created

[i] This script synchronizes an NVT collection with the 'OpenVAS NVT Feed'.
[i] Online information about this feed: 'http://www.openvas.org/openvas-nvt-feed
...
sent 1143 bytes received 681741238 bytes 1736923.26 bytes/sec
total size is 681654050 speedup is 1.00

https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/ 1/3
10/20/2017 OpenVAS 8.0 Vulnerability Scanning | Kali Linux

[i] Initializing scap database


[i] Updating CPEs
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2002.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2003.xml
...
Write out database with 1 new entries
Once openvas-setup completes its process, the OpenVAS manager, scanner, and GSAD services should be listening:

root@kali:~# netstat -antp


Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9390 0.0.0.0:* LISTEN 9583/openvasmd
tcp 0 0 127.0.0.1:9391 0.0.0.0:* LISTEN 9570/openvassd: Wai
tcp 0 0 127.0.0.1:9392 0.0.0.0:* LISTEN 9596/gsad

Starting the OpenVAS services


If you have already con gured OpenVAS, you can simply start all the necessary services by running openvas-start.

root@kali:~# openvas-start
Starting OpenVas Services
Starting Greenbone Security Assistant: gsad.
Starting OpenVAS Scanner: openvassd.
Starting OpenVAS Manager: openvasmd.
If you need to troubleshoot any issues, you can use openvas-check-setup to identity the problem.

Connecting to the OpenVAS Web Interface


Point your browser to https://127.0.0.1:9392, accept the self signed SSL certi cate and plugin the credentials for the
admin user. The admin password was generated during the setup phase (look at the output above if you missed it).


https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/ 2/3
10/20/2017 OpenVAS 8.0 Vulnerability Scanning | Kali Linux

openvas vulnerability scanner

Thats it! Now OpenVAS is ready for you to con gure it and run a scan against a given IP or range. Happy vulnerability
scanning!


https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/ 3/3

You might also like