From Fedora Project Wiki
No edit summary
No edit summary
Line 6: Line 6:
* Ensure that {{package|openvas-scanner}}, {{package|openvas-libraries}}, {{package|openvas-client}} packages are installed.
* Ensure that {{package|openvas-scanner}}, {{package|openvas-libraries}}, {{package|openvas-client}} packages are installed.
|actions=
|actions=
# Start OpenVAS scanner: ''' /etc/init.d/openvas-scanner start'''
# Start OpenVAS scanner: {{command| /etc/init.d/openvas-scanner start}}
# Create a new certificate: '''openvas-mkcert'''
# Create a new certificate: {{command|openvas-mkcert}}
# Add a OpenVAS user: '''openvas-adduser'''
# Add a OpenVAS user: {{command|openvas-adduser}}
# Update the NVTs: '''openvas-nvt-sync'''
# Update the NVTs: {{command|openvas-nvt-sync}}
# Restart OpenVAS scanner (take a while for the first time): '''/etc/init.d/openvas-scanner restart'''
# Restart OpenVAS scanner (take a while for the first time): {{command|/etc/init.d/openvas-scanner restart}}
# Start OpenVAS client: '''openvas-client''' (Or System Tools > OpenVAS Client)
# Start OpenVAS client: {{command|openvas-client''' (Or System Tools > OpenVAS Client)
# Connect to OpenVAS server with the user created in step 3.
# Connect to OpenVAS server with the user created in step 3.
# Create a new scan using the client and wait until it finishes.
# Create a new scan using the client and wait until it finishes.
# Export the report to a HTML or PDF.
# Export the report to HTML or PDF.
|results=
|results=
# The scan should finish correctly.
# The scan should finish correctly.
# In the report, you should see the network services being scanned and vulnerabilities reported.
# In the report, you should see the network services being scanned and vulnerabilities reported.
}}
}}

Revision as of 22:21, 28 May 2011

{{QA/Test_Case |description=This test case tests the ability of OpenVAS to scan a host or network for vulnerabilities. |setup=

  • A remote host with various network services (SSH, HTTP, DNS, SMTP ...) is required. For example: a Linux server with OpenSSH, Apache HTTPd, ISC BIND, Postfix or Sendmail.
  • Open ports of the scanned services in the remote host firewall.
  • Ensure that openvas-scanner, openvas-libraries, openvas-client packages are installed.

|actions=

  1. Start OpenVAS scanner: /etc/init.d/openvas-scanner start
  2. Create a new certificate: openvas-mkcert
  3. Add a OpenVAS user: openvas-adduser
  4. Update the NVTs: openvas-nvt-sync
  5. Restart OpenVAS scanner (take a while for the first time): /etc/init.d/openvas-scanner restart
  6. Start OpenVAS client: openvas-client (Or System Tools > OpenVAS Client)
  7. Connect to OpenVAS server with the user created in step 3.
  8. Create a new scan using the client and wait until it finishes.
  9. Export the report to HTML or PDF.