From Fedora Project Wiki
No edit summary
No edit summary
Line 3: Line 3:
|setup=
|setup=
* A remote host with various network services (SSH, HTTP, DNS, SMTP ...).
* A remote host with various network services (SSH, HTTP, DNS, SMTP ...).
For example: a Linux server with OpenSSH, Apache HTTPd, ISC BIND, Postfix or Sendmail ...
For example: a Linux server with OpenSSH, Apache HTTPd, ISC BIND, Postfix or Sendmail; with ports opened in the firewall (or disable iptables temporary with: '''service iptables stop''')
* Install OpenVAS packages:  
* Install OpenVAS packages:  
<pre>yum install openvas-scanner openvas-libraries openvas-client</pre>
<pre>yum install openvas-scanner openvas-libraries openvas-client</pre>
|actions=
|actions=
# Start here ...
# Start OpenVAS scanner: '''/etc/init.d/openvas-scanner'''
# Next do this ...
# Create a new certificate: '''openvas-mkcert'''
# Finally click that
# Add a OpenVAS user: '''openvas-adduser'''
# Update the NVTs: '''openvas-nvt-sync'''
# Restart OpenVAS scanner (take a while for the first time): '''/etc/init.d/openvas-scanner restart'''
# Start OpenVAS client: '''openvas-client''' (Or System Tools > OpenVAS Client)
# Create a new scan using the client and wait until it finishes.
# Export the report to a HTML or PDF.
|results=
|results=
The following must be true to consider this a successful test run. Be brief ... but explicit.  
# The scan should finish correctly.
# Step #1 completes without error
# In the report, you should see the network services being scanned and vulnerabilities reported if exist.
# The system boots into runlevel 5
# Program completes wth exit code 0
}}
}}

Revision as of 06:48, 28 May 2011

Description

Using OpenVAS to scan a hosts or network for vulnerabilities.

Setup

  • A remote host with various network services (SSH, HTTP, DNS, SMTP ...).

For example: a Linux server with OpenSSH, Apache HTTPd, ISC BIND, Postfix or Sendmail; with ports opened in the firewall (or disable iptables temporary with: service iptables stop)

  • Install OpenVAS packages:
yum install openvas-scanner openvas-libraries openvas-client

How to test

  1. Start OpenVAS scanner: /etc/init.d/openvas-scanner
  2. Create a new certificate: openvas-mkcert
  3. Add a OpenVAS user: openvas-adduser
  4. Update the NVTs: openvas-nvt-sync
  5. Restart OpenVAS scanner (take a while for the first time): /etc/init.d/openvas-scanner restart
  6. Start OpenVAS client: openvas-client (Or System Tools > OpenVAS Client)
  7. Create a new scan using the client and wait until it finishes.
  8. Export the report to a HTML or PDF.

Expected Results

  1. The scan should finish correctly.
  2. In the report, you should see the network services being scanned and vulnerabilities reported if exist.