User:Maffblaster/Drafts/OpenVAS

From Gentoo Wiki
Jump to: navigation, search
Warning
This page has been nominated for deletion.

The given reason is: This page should be deleted because the OpenVAS project name has been renamed in GVM and old OpenVAS loader package with all components removed from gentoo tree. GVM is a major update and all the commands and informations on this page are deprecated. We have new wiki page for new GVM --> https://wiki.gentoo.org/wiki/Greenbone_Vulnerability_Management

If you disagree with its deletion, do not remove this notice; discuss your objections on the associated discussion page.

Administrators, please remember to check if anything links here and the page history before deleting.

This notice should remain for a minimum of 1 month after it was placed on the page. If discussion is still ongoing it should remain until a consensus is reached, at which time the page may be deleted or this notice may be removed. (However, if the page has only been edited by the user who nominated it for deletion and/or is in the nominator's user space, then a speedy deletion may be called for.)

OpenVAS (Open Vulnerability Assessment System) is security scanning software used identify and detect network accessible vulnerabilities. It is used by both offensive and defensive security experts to determine attack surfaces.

Installation

USE flags

Cannot load package information. Is the atom net-analyzer/openvas correct?

Emerge

The net-analyzer/openvas is a meta-package. It depends upon the command-line interface, libraries, manager, scanner, and tools. Do not be surprised if the dependency list is a little long:

root #emerge --ask net-analyzer/openvas

Additional software

Additional support for extra checks gained from emerging the following software:

Package Description
app-forensics/ovaldi For ovaldi (OVAL) — an OVAL Interpreter.
net-analyzer/amap For amap — an application protocol detection tool.
net-analyzer/greebone-security-assistant For The Greenbone Security Assistant as alternative to the plain scanner.
net-analyzer/ike-scan For ike-scan - an IPsec VPN scanning, fingerprinting and testing tool.
net-analyzer/nikto For Nikto — a web server scanning and testing tool.
net-analyzer/portbunny For portbunny — a Linux-kernel-based portscanner.
net-analyzer/w3af For w3af — a web application attack and audit framework.

Configuration

The following steps can be checked at any point by running the openvas-check-setup utility.

Generate an SSL certificate

Before OpenVAS can be started, an SSL certificate must be generated:

root #openvas-mkcert

Generate the client's SSL certificate

root #openvas-mkcert-client -n -i

Download vulnerability list

Download the vulnerability list with the following command:

root #openvas-nvt-sync

Update the scan daemon's cache

root #openvassd --only-cache

Rebuild the management daemon's NVT cache

root #openvasmd --rebuild

Download the SCAP data

root #openvas-scapdata-sync

Download the OpenVAS CERT database

root #openvas-certdata-sync

Create a user

Users will not be able to login until accounts have been created for them. Pretending a user by the name of Larry would like to create an account:

root #openvasmd --create-user larry

Unless you want a large GUID for a password, be sure to change it:

root #openvasmd --user=larry --new-password=SuPErSeCR3TP@assw0rd

Users can be listed with the following command:

root #openvasmd --get-users

Usage

Troubleshooting

Stuck on configuration steps

root #openvas-check-setup

Service not starting

Check the log files located at /var/log/openvas/.

See also