OpenVas


OpenVas is a open source vulnerability assesment system just like nessus, openVas used to find the vulnerabilities on a computer system, it is open source so you dont need to buy it, however you can get home feed of nessus for free too, but we consider both of them. If you want to know more about OpenVas than click here, and for nessus click here.

You can find nessu on backtrack 5 but you have to install openvas on backtrack5, so below is the tutorial for Openvas it includes how to install openvas in backtrack 5 and some basic usage.

Backtrack5 is not necessary to run openvas, if you are using some other version of backtrack or if you are using some other distro like Ubuntu than the procedure is same.

How To Install OpenVas

Open terminal on bt5 or ubuntu and type exactly

root@bt:~# apt-get install openvas

root@bt:~# sudo apt-get update

It begins your openvas installation and update all the applications. When Openvas has been installed you can find it on Application –> Backtrack –> Vulnerability assessment –> vulnerability scanner –> Openvas . See the picture.

On the next step click on openvas-check-setup, it will show you the problem and suggest some solution.
Its time to add user, from the menu select Openvas adduser, enter the login name and password, for rule type ctrl-d.

Now click on OpenVas NVT sync, by this you will get the latest NVT’s from openvas database, you must do this step frequently to make update your Openvas.
Start openvas scanner from the menu, it may takes some time.
Open terminal for setting up openvas manager, use the command

root@bt:~# openvas-mkcert-client -n om -i

rebuild the database by the command

root@bt:~# openvasmd –rebuild

On the terminal type the command to set openvas administrator

root@bt:~# openvasad -c ‘add_user’ -n openvasadmin -r Admin

Now click on start Openvas manager from the menu and use the command.

root@bt:~# openvasmd -p 9390 -a 127.0.0.1

Start openvas administrator from the menu and type

root@bt:~# openvasad -a 127.0.0.1 -p 9393

Your are almost done, just start Greenbone security assistant and use

root@bt:~# gsad –http-only –listen=127.0.0.1 -p 9392

Now open your web browser and type http://127.0.0.1:9392/
Use your username and password that has been set on previous step.

About these ads

Tinggalkan Balasan

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Logout / Ubah )

Twitter picture

You are commenting using your Twitter account. Logout / Ubah )

Facebook photo

You are commenting using your Facebook account. Logout / Ubah )

Google+ photo

You are commenting using your Google+ account. Logout / Ubah )

Connecting to %s

Fiazku

Kecerdasan Manusia Bodoh

AHAO's Blog

Hal Kecil dan Terabaikan Bisa Dibikin Jadi Penting :-)

Alex Feleol

"Compartilhando conhecimento em TI"

WordPress.com News

The latest news on WordPress.com and the WordPress community.

Ikuti

Get every new post delivered to your Inbox.