In this tutorials I want to cover extra information about automated vulnerability scanning starting with the set up technique accompanied by putting in objectives, strolling internal and outside scans and finally define custom scanning configurations. Due to the period of the total academic we’ll break up it into 2 or 3 components in order to be published in the imminent weeks. In component 1 of this tutorial I need to cowl the installation of the maximum current version of OpenVAS 9.0, which became launched in 2017. The contemporary version nine.0 introduces a brand new net interface which gives quit customers better methods to manipulate scanning options, property and workflows thru the internet interface. In this tutorial we are able to walk thru the set up technique on Kali Linux, so we can run vulnerability scans from our personal tool, and as virtual equipment in a community. The digital equipment can be set up in a community surroundings to have it periodically run computerized scans on gadgets gift at the community. In element 2 of ‘Vulnerability Scanning with OpenVAS 9.0’ I want to dive a bit bit deeper into vulnerability scanning with this device with the aid of configuring goals, assets and custom scanning configurations.

Before we will start configuring vulnerability scans we must deploy OpenVAS first. We can try this with a package manager or by way of installing the OpenVAS appliance on VMware Workstation/ESXi, Oracle VirtualBox or Hyper-V. In the first part of this tutorial we’ll use APT on Kali Linux after which we can set up the equipment on VMware. As some distance as digital system resources are worried, we’ve committed 2 GB of RAM and a couple of processor cores to the Kali Linux VM which ought to be sufficient to run some fundamental scans smoothly with a restrained number of signatures on a restricted quantity of targets.

Installing Openvas 9 on Kali Linux

To install Openvas 9 and its dependencies on our Kali Linux system we simply have to run the following command:

apt-get update && apt-get install openvas

OpenVASThe subsequent step to run the setup method so one can setup OpenVAS and down load a large number of Network Vulnerability Tests (NVTs) or signatures. Due to the huge quantity of NVTs (50.000+) the setup manner may take a while to complete and devour a large amount of information. On the take a look at setup we’ve used for this academic the entire setup manner took 10 minutes to finish which isn’t always horrific at all.

Run the subsequent command to begin the setup process:


OpenVASWhen the setup process is finished, all required OpenVAS processes are started and the web interface will be opened automatically. The web interface is running locally on port 9392 and can accessed through: https://localhost:9392. OpenVAS will also setup and admin account and automatically generate a password for this account which is displayed in the last section of the setup output:OpenVAS

Password reset
Did you forgot to note down the password? You can change the admin password using the following commands:

openvasmd –user=[username]–new-password=[password]
openvasmd –user=admin –new-password=[password]

The next step is to accept the self-signed certificate warning and use the automatically generated admin credentials to login on the web interface:OpenVAS

After logging in on the web interface we’re redirected to the Greenbone Security Assistant dashboard. From this point on we can start to configure and run vulnerability scans.OpenVAS

Starting and stopping OpenVAS

The closing step I need to point out earlier than we head on with the set up of the virtual appliance is the way to begin and stop OpenVAS services. OpenVAS services may eat loads of needless resources and therefore it’s miles cautioned to terminate those offerings while you’re now not the use of OpenVAS.

Run the following command to prevent the offerings:


To start the OpenVAS services again, run:


Setting up the OpenVAS Virtual Appliance

Instead of putting in OpenVAS on Kali Linux we can also install the OpenVAS digital appliance in a network and configure it to periodically run scans on the community. The virtual appliance may be downloaded the use of the subsequent hyperlink: http://www.Openvas.Org/vm.html

After downloading the virtual appliance from the OpenVAS website we have to configure a new virtual system. In this tutorial we can be using VMware but you could additionally use other hypervisors which includes Hyper-V on Windows or Oracle VirtualBox. In manufacturing environments you may most probable use VMware ESXi, Microsoft Hyper-V or other hypervisors. Let’s begin with configuring a VM with the following specs:

  • Processor cores: 2
  • 2 GB RAM
  • 10 GB Hard disk
  • Network: NAT (only when using VMware Workstation/Free/Virtualbox)
  • CD/DVD drive: ISO (choose the downloaded iso file as medium)
  • Guest operating system: Linux Kernel 4.x or later 64-bit (VMWare) or Other Linux (64bit) (VirtualBox)

The next step is to boot the virtual machine which will take us to the following installation menu:OpenVAS

From this menu choose the setup option. Next we’re asked if we really want to format the hard drive, choose yes:OpenVAS

The virtual appliance could be hooked up which would possibly take a while. When the installation manner is completed we must specify a username for the administrator person. We’ll maintain it default as admin in addition to the password:OpenVAS

Tip: If you’re installing the appliance in your production network make sure that you choose a strong password for the administrative account.

After specifying the username and password we’re requested to reboot the gadget, choose ‘yes’ to reboot and additionally to eject the installation medium:OpenVAS

After the virtual machine has rebooted (twice) we’re taken to a login screen looking as follows:OpenVAS

Note: After the first reboot we’re presented with a different login screen, just wait until the second reboot happens.

Here we can login the usage of the credentials we’ve created earlier in the set up procedure (username: admin). After logging in we’re supplied with the following message which tells us OpenVAS has no longer been fully configured yet. From here we are able to continue with the setup process. Choose ‘yes’ within the following menu the continue with the setup technique:OpenVAS

Next, we’re asked to configure an IP address for the appliance, choose ‘yes’:OpenVAS

For our check setup we’ll keep the network configuration default and feature it assigned an IP address with the aid of our DHCP server. Optionally you may set a static IP deal with that is of route the advocated alternative in a production environment. Choose ‘Ready’ to proceed:OpenVAS

The next step is to create a web-admin user, choose ‘Yes’ in the following menuOpenVAS

Create the user by choosing a username and password:OpenVAS

Finally we’re ask approximately a subscription key, until you’re inside the ownership of a subscription key, pick out ‘pass’ which will provide us with the Greenbone network feed:OpenVAS

Next we’re requested if we need to replace the feed, pick ‘sure’ to upgrade the feed in the historical past. After strolling via all settings we will sign off or reboot the equipment and we’re supplied with an IP cope with to access the net interface:OpenVAS

When we browser to the web interface we’re provided with a login page. Use the credentials of the web-admin account we’ve created at some stage in the configuration technique:OpenVAS

At this point we’ve got a totally useful OpenVAS digital appliance up and walking that can be configured to run vulnerability scans. This will conclude the set up process of the equipment.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.