Open Vulnerability Assessment Scanner
The most powerful vulnerability scanner today, it consists of; CLI(command line interface) and GUI(graphic user interface)OpenVAS overview
information source from OpenVAS website
Architecture Overview
The Open Vulnerability Assessment System (OpenVAS) is a framework of several services and tools. The core of this SSL-secured service-oriented architecture is the OpenVAS Scanner. The scanner very efficiently executes the actual Network Vulnerability Tests (NVTs) which are served via the OpenVAS NVT Feed or via a commercial feed service.
image courtesy of OpenVAS |
The OpenVAS Manager is the central service that consolidates plain vulnerability scanning into a full vulnerability management solution. The Manager controls the Scanner via OTP (OpenVAS Transfer Protocol) and itself offers the XML-based, stateless OpenVAS Management Protocol (OMP). All intelligence is implemented in the Manager so that it is possible to implement various lean clients that will behave consistently e.g. with regard to filtering or sorting scan results. The Manager also controls a SQL database (sqlite-based) where all configuration and scan result data is centrally stored. Finally, Manager also handles user management includiung access control with groups and roles.
image courtesy of OpenVAS |
Different OMP clients are available: The Greenbone Security Assistant (GSA) is a lean web service offering a user interface for web browsers. GSA uses XSL transformation stylesheet that converts OMP responses into HTML.
OpenVAS CLI contains the command line tool "omp" which allows to create batch processes to drive OpenVAS Manager. Another tool of this package is a Nagios plugin.
image courtesy of OpenVAS |
Most of the tools listed above share functionality that is aggregated in the OpenVAS Libraries.
The OpenVAS Scanner offers the communication protocol OTP (OpenVAS Transfer Protocol) which allows to control the scan execution. This protocol is subject to be eventually replaced and thus it is not recommended to develop OTP clients.
Feature overview
- OpenVAS Scanner
- Many target hosts are scanned concurrently
- OpenVAS Transfer Protocol (OTP)
- SSL support for OTP (always)
- WMI support (optional)
- OpenVAS Manager
- OpenVAS Management Protocol (OMP)
- SQL Database (sqlite) for configurations and scan results
- SSL support for OMP (always)
- Many concurrent scans tasks (many OpenVAS Scanners)
- Notes management for scan results
- False Positive management for scan results
- Scheduled scans
- Flexible escalators upon status of a scan task
- Stop, Pause and Resume of scan tasks
- Master-Slave Mode to control many instances from a central one
- Reports Format Plugin Framework with various plugins for: XML, HTML, LateX, etc.
- User Management
- Feed status view
- Feed synchronisation
- Greenbone Security Assistant (GSA)
- Client for OMP and OAP
- HTTP and HTTPS
- Web server on its own (microhttpd), thus no extra web server required
- Integrated online-help system
- Multi-language support
- OpenVAS CLI
- Client for OMP
- Runs on Windows, Linux, etc.
- Plugin for Nagios
OpenVAS for Debian via OBS
Step 1: Configure OBS Repository
(as user root, only once)
(as user root, only once)
echo "deb http://download.opensuse.org/repositories/security:
/OpenVAS:/UNSTABLE:/v5/Debian_6.0/ ./" >> /etc/apt/sources.list apt-key
adv --keyserver hkp://keys.gnupg.net --recv-keys BED1E87979EAFD54
sudo apt-get update
Step 2: Quick-Install OpenVAS
(as user root, only once)
(as user root, only once)
apt-get -y install greenbone-security-assistant gsd openvas-cli openvas-manager
openvas-scanner openvas-administrator sqlite3 xsltproc
To install support packages for report generation (downloads around 30 MB of additional packages):
apt-get -y install texlive-latex-base texlive-latex-extra
texlive-latex-recommended htmldoc
To install support for autogenerated LSC credential packages:
apt-get -y install alien rpm nsis fakeroot
Step 3: Quick-Start OpenVAS
(copy and paste whole block as user root, during first time you will be asked to set a password for user "admin")
(copy and paste whole block as user root, during first time you will be asked to set a password for user "admin")
test -e /var/lib/openvas/CA/cacert.pem || openvas-mkcert -q
openvas-nvt-sync
test -e /var/lib/openvas/users/om || openvas-mkcert-client -n om -i
/etc/init.d/openvas-manager stop
/etc/init.d/openvas-scanner stop
openvassd
openvasmd --migrate
openvasmd --rebuild
killall openvassd
sleep 15
/etc/init.d/openvas-scanner start
/etc/init.d/openvas-manager start
/etc/init.d/openvas-administrator restart
/etc/init.d/greenbone-security-assistant restart
test -e /var/lib/openvas/users/admin || openvasad -c add_user -n admin -r Admin
Step 4: Log into OpenVAS as "admin"
Open https://localhost:9392/ or start "gsd" on a command line as a regular user (not as root!).
No comments:
Post a Comment