1 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
main (/main/)
account (/account/)
Dashboard
ScanArch guides and tutorials
General guides
Networking
Scanning
How to use masscan to find heartbleed
vulnerabilities (/How-to-use-masscanto-find-heartbleed-vulnerabilities/)
How to scan for vulnerabilities with
OpenVAS (/How-to-scanfor-vulnerabilities-with-OpenVAS/)
Security guides
21/06/2015 20:34
2 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
test -e /var/lib/openvas/CA/cacert.pem
|| openvas-mkcert -q
openvas-nvt-sync
/etc/init.d/openvas-manager stop
/etc/init.d/openvas-scanner stop
openvassd
openvasmd --rebuild
openvas-scapdata-sync
openvas-certdata-sync
21/06/2015 20:34
3 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
killall openvassd
sleep 15
/etc/init.d/openvas-scanner start
/etc/init.d/openvas-manager start
/etc/init.d/openvas-administrator restart
/etc/init.d/greenbone-security-assistant restart
yum upgrade
yum install openvas
openvas-setup
21/06/2015 20:34
4 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
zypper ar -f http://download.opensuse.org/repositories/security:/OpenVAS:/UNSTABLE:/v
6/openSUSE_12.3/ openvas
openvas-setup
chmod +x openvas-check-setup
21/06/2015 20:34
5 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
./openvas-check-setup
./openvas-check-setup --server
openvas-check-setup 2.0.1
Test completeness and readiness of OpenVAS-4
Please report us any non-detected problems and
help us to improve this check routine:
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
Send us the log-file (/tmp/openvas-check-setup.log) to help analyze the problem.
Use the parameter --server to skip checks for client tools
like GSD and OpenVAS-CLI.
Step 1: Checking OpenVAS Scanner ...
OK: OpenVAS Scanner is present in version 3.2.3.
OK: OpenVAS Scanner CA Certificate is present as /var/lib/openvas/CA/cacert.pe
m.
OK: NVT collection in /var/lib/openvas/plugins contains 20380 NVTs.
Step 2: Checking OpenVAS Manager ...
OK: OpenVAS Manager is present in version 3.0.0.
OK: OpenVAS Manager client certificate is present as /var/lib/openvas/CA/clien
tcert.pem.
OK: OpenVAS Manager database found in /var/lib/openvas/mgr/tasks.db.
OK: sqlite3 found, extended checks of the OpenVAS Manager installation enabled
.
OK: OpenVAS Manager database is at revision 42.
OK: OpenVAS Manager expects database at revision 42.
OK: Database schema is up to date.
OK: xsltproc found.
Step 3: Checking OpenVAS Administrator ...
OK: OpenVAS Administrator is present in version 1.1.2.
OK: At least one user exists.
ERROR: No admin user found. You need to create at least one admin user to log
in.
FIX: Create a user using 'openvasad -c 'add_user' -n -r Admin'
ERROR: Your OpenVAS-4 installation is not yet complete!
Please follow the instructions marked with FIX above and run this
script again.
If you think this result is wrong, please report your observation
and help us to improve this check routine:
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
Please attach the log-file (/tmp/openvas-check-setup.log) to help us analyze the probl
em.
21/06/2015 20:34
6 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
openvas-check-setup 2.0.1
Test completeness and readiness of OpenVAS-4
Please report us any non-detected problems and
help us to improve this check routine:
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
Send us the log-file (/tmp/openvas-check-setup.log) to help analyze the problem.
Use the parameter --server to skip checks for client tools
like GSD and OpenVAS-CLI.
Step 1: Checking OpenVAS Scanner ...
OK: OpenVAS Scanner is present in version 3.2.3.
OK: OpenVAS Scanner CA Certificate is present as /var/lib/openvas/CA/cacert.pe
m.
OK: NVT collection in /var/lib/openvas/plugins contains 20380 NVTs.
Step 2: Checking OpenVAS Manager ...
OK: OpenVAS Manager is present in version 3.0.0.
OK: OpenVAS Manager client certificate is present as /var/lib/openvas/CA/clien
tcert.pem.
OK: OpenVAS Manager database found in /var/lib/openvas/mgr/tasks.db.
OK: sqlite3 found, extended checks of the OpenVAS Manager installation enabled
.
OK: OpenVAS Manager database is at revision 42.
OK: OpenVAS Manager expects database at revision 42.
OK: Database schema is up to date.
OK: xsltproc found.
Step 3: Checking OpenVAS Administrator ...
OK: OpenVAS Administrator is present in version 1.1.2.
OK: At least one user exists.
OK: At least one admin user exists.
Step 4: Checking Greenbone Security Assistant (GSA) ...
OK: Greenbone Security Assistant is present in version 3.0.0.
Step 5: Checking OpenVAS CLI ...
OK: OpenVAS CLI version 1.1.2.
Step 6: Checking Greenbone Security Desktop (GSD) ...
OK: Greenbone Security Desktop is present in Version 1.1.1.
Step 7: Checking if OpenVAS services are up and running ...
OK: netstat found, extended checks of the OpenVAS services enabled.
OK: OpenVAS Scanner is running and listening on all interfaces.
OK: OpenVAS Scanner is listening on port 9391, which is the default port.
OK: OpenVAS Manager is running and listening on all interfaces.
OK: OpenVAS Manager is listening on port 9390, which is the default port.
OK: OpenVAS Administrator is running and listening on all interfaces.
OK: OpenVAS Administrator is listening on port 9393, which is the default port
.
OK: Greenbone Security Assistant is running and listening on all interfaces.
OK: Greenbone Security Assistant is listening on port 9392, which is the defau
lt port.
It seems like your OpenVAS-4 installation is OK.
If you think it is not OK, please report your observation
and help us to improve this check routine:
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
Please attach the log-file (/tmp/openvas-check-setup.log) to help us analyze the probl
em.
omp -g
21/06/2015 20:34
7 sur 10
empty
Full and
Full and
Full and
Full and
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
fast
fast ultimate
very deep
very deep ultimate
omp --xml='
<create_target>
<name>Target Name</name>
<hosts>172.16.83.130</hosts>
</create_target>'
omp -G
21/06/2015 20:34
8 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
https://127.0.0.1:9392
21/06/2015 20:34
9 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
21/06/2015 20:34
10 sur 10
https://kb.scanarch.com/How-to-scan-for-vulnerabilities-with-OpenVAS/
21/06/2015 20:34