OpenVAS is a framework of
several services and tools offering a comprehensive and powerful vulnerability
scanning and vulnerability management solution. The framework is part of Greenbone
Networks commercial
vulnerability management solution from which developments are contributed to
the Open Source community since 2009.
·
The actual security scanner is
accompanied with a regularly updated feed of Network Vulnerability Tests
(NVTs), over 50,000 in total. All OpenVAS products are Free Software. Most
components are licensed under the GNU General Public License (GNU GPL).
·
About
NVT Feed - Greenbone maintains a public feed of Network
Vulnerability Tests (NVTs) for the OpenVAS project, the Greenbone Community
Feed. It contains more than 50,000 NVTs, growing on a permanent basis. This
feed is configured as the default for the OpenVAS Scanner and relates to the
Greenbone Security Feed which is part of the commercial Greenbone Security
Manager appliance products.
·
For online-synchronization use the
command greenbone-nvt-sync to update your local NVTs with the newest
ones from the feed service. This command will download the Greenbone Community
Feed unless it is executed in a Greenbone OS environment with a valid
subscription key in which case it will download the Greenbone Security Feed.
·
OpenVAS Manager
is the central service that consolidates plain vulnerability scanning into a
full vulnerability management solution. The Manager controls the Scanner via
OTP (OpenVAS Transfer Protocol) and itself offers the XML-based, stateless
OpenVAS Management Protocol (OMP). All intelligence is implemented in the
Manager so that it is possible to implement various lean clients that will
behave consistently e.g. with regard to filtering or sorting scan results. The
Manager also controls a SQL database
(sqlite-based) where all
configuration and scan result data is centrally stored. Finally, Manager also
handles user management including access control with groups and roles.
Installation and Configuration
·
OpenVAS is not included
in the default Ubuntu repositories, install its PPA
sudo apt install software-properties-common
sudo add-apt-repository ppa:mrazavi/openvas
·
Install the SQLite 3
database package. This is used to store the Common Vulnerabilities and
Exposures (CVE) data.
sudo apt-get install -y sqlite3 rpm nsis alien
sudo apt-get install -y sqlite3 texlive-latex-extra
--no-install-recommends
sudo apt-get install -y texlive-fonts-recommended
sudo wget --no-check-certificate
https://svn.wald.intevation.org/svn/openvas/branches/tools-attic/openvas-check-setup
sudo chmod +x openvas-check-setup
apt-get install openvas9
sudo apt update –y
·
Sync the OpenVAS NVT
feed. This allows your installation to access tests for the most current
vulnerabilities and exposures.
sudo greenbone-nvt-sync
·
Sync Security Content
Automation Protocol (SCAP) and Computer Emergency Readiness Team (CERT)
vulnerability data to a local database. The synchronization will take several
minutes, and you can monitor its progress in the output
sudo greenbone-scapdata-sync
sudo greenbone-certdata-sync
service openvas-scanner start
service openvas-manager start
openvasmd --update –progress
sudo openvasmd --rebuild --progress
sudo ./openvas-check-setup --v9
service openvas-scanner start
service openvas-manager start
·
After successful
installation go to browser and type https://Your_Public_IP:4000 you will see
login page where default login and password is admin:admin.
·
You can change it by sudo openvasmd
--user=admin --new-password=admin
·
Go to scan- task- task
wizard and give IP where you want to run scan.
·
After scan you will see
result like this.
·
Note-If
you see error in browser like - The request contained an unknown or invalid
Host header. If you are trying to access GSA via its hostname or a proxy, make
sure GSA is set up to allow it.
To Solve this -
Edit -
/etc/default/openvas-gsa
change
#ALLOW_HEADER_HOST=
To
ALLOW_HEADER_HOST=Your_Public_IP
Comments
Post a Comment