How to do it...

The following steps will guide you to perform vulnerability scan with the help of OpenVAS:

  1. OpenVAS does not come preinstalled on Kali Linux, but it is a simple process to get it installed and running. To begin, we will use the apt-get command to install the software; when prompted to continue, type Y:
  1. Once successfully installed, run the openvas-setup command: 
  1. It will take a while for the set up to configure itself and install the vulnerability test scripts. At the conclusion of the configuration, take note of the password created. This will be needed when logging into the OpenVAS web interface:

  1. Once OpenVAS has been installed and configured we can start it using the openvas-start command:
  1. We can now access the OpenVAS web interface by navigating to https://127.0.0.1:9392/ with our local browser. We can authenticate using admin as our Username and Password we received at the conclusion of the openvas-setup process:
  1. Upon successful authentication you are presented with the OpenVAS dashboard. Here (if you have any) you can see statistics on your scans and vulnerabilities. Given that we have just installed OpenVAS we do not currently have any data to display. We can change this by running a scan. To do this, go to Scans in the top menu and select Tasks:
  1. Once on the the Tasks page, go to the wand icon in the top-left corner of the page and select Task Wizard:

  1. From the Task Wizard screen we are prompted to enter an IP address or hostname. For our example, we will use the IP address of our Metasploitable2 machine, 172.16.69.128, and click on the Start Scan button:
  1. On completion of the wizard, OpenVAS will begin scanning the target assigned. It will take some time for it to run the various scans and tests on your target machine. Upon completion, you should see a summary:
  1. To view the results of the OpenVAS scan, navigate to the Scans section of the menus and select Results:
  1. Here you can see the results of your scans. There are helpful charts showing the number of vulnerabilities by class (High, Medium, Low, Log) and by Common Vulnerability Scoring System (CVSS). Following the charts mentioned, we can see a list of each vulnerability, its severity, and its location:
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset