User:Maffblaster/Drafts/OpenVAS
This page has been nominated for deletion.
The given reason is: This page should be deleted because the OpenVAS project name has been renamed in GVM and old OpenVAS loader package with all components removed from gentoo tree. GVM is a major update and all the commands and informations on this page are deprecated. We have new wiki page for new GVM --> https://wiki.gentoo.org/wiki/Greenbone_Vulnerability_Management
If you disagree with its deletion, do not remove this notice; discuss your objections on the associated discussion page.
Administrators, please remember to check if anything links here and the page history before deleting.
This notice should remain for a minimum of 1 month after it was placed on the page. If discussion is still ongoing it should remain until a consensus is reached, at which time the page may be deleted or this notice may be removed. (However, if the page has only been edited by the user who nominated it for deletion and/or is in the nominator's user space, then a speedy deletion may be called for.)OpenVAS (Open Vulnerability Assessment System) is security scanning software used identify and detect network accessible vulnerabilities. It is used by both offensive and defensive security experts to determine attack surfaces.
Installation
USE flags
Emerge
The net-analyzer/openvas is a meta-package. It depends upon the command-line interface, libraries, manager, scanner, and tools. Do not be surprised if the dependency list is a little long:
root #
emerge --ask net-analyzer/openvas
Additional software
Additional support for extra checks gained from emerging the following software:
Package | Description |
---|---|
app-forensics/ovaldi | For ovaldi (OVAL) — an OVAL Interpreter. |
net-analyzer/amap | For amap — an application protocol detection tool. |
net-analyzer/greebone-security-assistant | For The Greenbone Security Assistant as alternative to the plain scanner. |
net-analyzer/ike-scan | For ike-scan - an IPsec VPN scanning, fingerprinting and testing tool. |
net-analyzer/nikto | For Nikto — a web server scanning and testing tool. |
net-analyzer/portbunny | For portbunny — a Linux-kernel-based portscanner. |
net-analyzer/w3af | For w3af — a web application attack and audit framework. |
Configuration
The following steps can be checked at any point by running the openvas-check-setup utility.
Generate an SSL certificate
Before OpenVAS can be started, an SSL certificate must be generated:
root #
openvas-mkcert
Generate the client's SSL certificate
root #
openvas-mkcert-client -n -i
Download vulnerability list
Download the vulnerability list with the following command:
root #
openvas-nvt-sync
Update the scan daemon's cache
root #
openvassd --only-cache
Rebuild the management daemon's NVT cache
root #
openvasmd --rebuild
Download the SCAP data
root #
openvas-scapdata-sync
Download the OpenVAS CERT database
root #
openvas-certdata-sync
Create a user
Users will not be able to login until accounts have been created for them. Pretending a user by the name of Larry would like to create an account:
root #
openvasmd --create-user larry
Unless you want a large GUID for a password, be sure to change it:
root #
openvasmd --user=larry --new-password=SuPErSeCR3TP@assw0rd
Users can be listed with the following command:
root #
openvasmd --get-users
Usage
Troubleshooting
Stuck on configuration steps
root #
openvas-check-setup
Service not starting
Check the log files located at /var/log/openvas/.
See also
- Security Handbook — a step-by-step hardening guide for Gentoo Linux.