Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

OpenVAS: Vulnerability Assessment Scanner

Its an open source vulnerability scanner based on Nessus. Very useful in home and small scale companies to implement and check the system, network and devices vulnerabilities.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

OpenVAS: Vulnerability Assessment Scanner

  1. 1. OPENVAS: VULNERABILITY ASSESSMENT SCANNER By ChandrakTrivedi_101015275 Melbin Sunny_101013552 OpenVAS_Group4_Chandrak-Melbin 1
  2. 2. Learning Objective • Understand the importance ofVulnerability Assessment (VA). • Explain how OpenVAS is used forVA. • Understand the logical architecture of OpenVAS framework. • ConductVA using OpenVAS. • Evaluate the purpose and value of OpenVAS report. • Determine how to mitigate vulnerabilities. OpenVAS_Group4_Chandrak-Melbin 2
  3. 3. VulnerabilityAssessment (VA) • What isVulnerability Assessment (VA)? • Why we needVulnerability Assessment (VA)? • RISK = ASSET *THREAT * VULNERABILITY OpenVAS_Group4_Chandrak-Melbin 3
  4. 4. OpenVAS_Group4_Chandrak-Melbin 4
  5. 5. OpenVAS Benefits • Open Source and uses NessusV2 as its plugin engine. • Compatible with different Operating System. • Keeps a history of past scans. Limitations • False negatives may be reported. • Determine/find less vulnerabilities as compared is Nexpose or Nessus. • Requires 2-3 services to perform vulnerability assessment. OpenVAS_Group4_Chandrak-Melbin 5
  6. 6. An overview of OpenVAS The OpenVulnerabilityAssessment Scanner known more commonly as OpenVAS, is a suite of tools that work together to run tests against client computers using a database of known exploits and weaknesses.The goal is to learn about how well your servers are guarded against known attack vectors OpenVAS is be used as VULNERALABILITYASSESSMENT tool and but also can be used as PENETRATIONTESTING tool. OpenVAS_Group4_Chandrak-Melbin 6
  7. 7. OpenVAS Architecture Clients Services Data OpenVAS_Group4_Chandrak-Melbin 7
  8. 8. Clients Components • OpenVAS CLI: is a set of tools that allow administration of OpenVAS through the shell. • Greenbone Security Assistant: is a web-based tool with an intuitive interface for variousVA that you are making. • Greenbone Desktop Security: is the tool that allows us to manage everything through the GUI interface on the desktop. OpenVAS_Group4_Chandrak-Melbin 8
  9. 9. Services Components • OpenVAS Scanner: is the component that allows us the scan of hostname/ip, port range “from-to” or entire networks such as “192.168.1.0/28”. • OpenVAS Manager: is the heart of OpenVAS, the manager receives task/information from the OpenVAS Administrator and the various administration tools CLI/WEB/GUI, then use the OpenVAS Scanner that will perform theVulnerability Assessment. Also includes component that processes the results of the scans, so it also generates the final report. • OpenVAS Administrator: is the component through which users can manage and the feed (i.e. the updates). OpenVAS_Group4_Chandrak-Melbin 9
  10. 10. Data Components • NVT’s: it is the container of feed, i.e. test cases that detect the vulnerabilities, which are currently over 20,000. • Results, config: is the database (PostgreSQL) where reports are collected and where the entire configuration of OpenVAS is stored. OpenVAS_Group4_Chandrak-Melbin 10
  11. 11. OpenVAS Feeds OpenVAS_Group4_Chandrak-Melbin 11
  12. 12. ConductingVA using OpenVAS OpenVAS_Group4_Chandrak-Melbin 12
  13. 13. Step 1: Setting up Kali forVulnerability Scanning https://www.kali.org/penetration-testing/openvas-vulnerability-scanning/ OpenVAS_Group4_Chandrak-Melbin 13
  14. 14. Step 1: Starting the OpenVAS services • Once openvas-setup completes its process, the OpenVAS manager, scanner, and GSAD services should be listening: • If you have already configured OpenVAS, you can simply start all the necessary services by running openvas-start. OpenVAS_Group4_Chandrak-Melbin 14
  15. 15. Step 1: Connecting to the OpenVASWeb Interface • Point your browser to https://127.0.0.1:9392, accept the self signed SSL certificate and plugin the credentials for the admin user.The admin password was generated during the setup phase. OpenVAS_Group4_Chandrak-Melbin 15
  16. 16. OpenVAS_Group4_Chandrak-Melbin 16
  17. 17. Step 2:Tabs • Explanation of AdministrationTab - • Adding Users, Groups and Roles. • Updating NetworkVulnerabilityTests (NVTs), Security Content Automation Protocol (SCAP) and Computer Emergency ResponseTeam (CERT) Feeds. OpenVAS_Group4_Chandrak-Melbin 17
  18. 18. Administration tab OpenVAS_Group4_Chandrak-Melbin 18
  19. 19. Add New Users OpenVAS_Group4_Chandrak-Melbin 19
  20. 20. New User details OpenVAS_Group4_Chandrak-Melbin 20
  21. 21. NVT Feed OpenVAS_Group4_Chandrak-Melbin 21
  22. 22. Step 2:Tabs • Explanation of Configuration tab - • Targets, Port lists and Credentials • Scan Config • Alerts and Schedules • Permissions OpenVAS_Group4_Chandrak-Melbin 22
  23. 23. Configuration tab OpenVAS_Group4_Chandrak-Melbin 23
  24. 24. Targets OpenVAS_Group4_Chandrak-Melbin 24
  25. 25. Port List OpenVAS_Group4_Chandrak-Melbin 25
  26. 26. Scan Configuration OpenVAS_Group4_Chandrak-Melbin 26
  27. 27. Permissions OpenVAS_Group4_Chandrak-Melbin 27
  28. 28. Step 2:Tabs • Explanation of SecInfo Management tab - • SecInfo Dashboard • NetworkVulnerability tests (NVTs) • CommonVulnerabilities and Exposures (CVEs) OpenVAS_Group4_Chandrak-Melbin 28
  29. 29. SecInfo Management OpenVAS_Group4_Chandrak-Melbin 29
  30. 30. SecInfo Dashboard OpenVAS_Group4_Chandrak-Melbin 30
  31. 31. NVTs – NetworkVulnerability test OpenVAS_Group4_Chandrak-Melbin 31
  32. 32. CVEs – CommonVulnerabilities and Exposure OpenVAS_Group4_Chandrak-Melbin 32
  33. 33. Step 2:Tabs • Explanation of Scan Management - • Tasks • Reports • Results OpenVAS_Group4_Chandrak-Melbin 33
  34. 34. Scan Management tab OpenVAS_Group4_Chandrak-Melbin 34
  35. 35. NewTasks OpenVAS_Group4_Chandrak-Melbin 35
  36. 36. Reports OpenVAS_Group4_Chandrak-Melbin 36
  37. 37. Results OpenVAS_Group4_Chandrak-Melbin 37
  38. 38. Step 3: Scanning •Explanation for Scanning aTarget to findVulnerabilities. •Procedures • I: NewTarget (CreatingTarget) • II: NewTask (CreatingTask) • III: Scanning OpenVAS_Group4_Chandrak-Melbin 38
  39. 39. I. NewTarget OpenVAS_Group4_Chandrak-Melbin 39
  40. 40. Port List Options OpenVAS_Group4_Chandrak-Melbin 40
  41. 41. TargetAdded OpenVAS_Group4_Chandrak-Melbin 41
  42. 42. II. NewTask OpenVAS_Group4_Chandrak-Melbin 42
  43. 43. Scan Config Options OpenVAS_Group4_Chandrak-Melbin 43
  44. 44. Task Created OpenVAS_Group4_Chandrak-Melbin 44
  45. 45. III. Start Scanning OpenVAS_Group4_Chandrak-Melbin 45
  46. 46. TotalTask List OpenVAS_Group4_Chandrak-Melbin 46
  47. 47. ScannedTarget Summary Report OpenVAS_Group4_Chandrak-Melbin 47
  48. 48. Results ofTarget OpenVAS_Group4_Chandrak-Melbin 48
  49. 49. Step 4: Export report ofVA conducted • Explanation on Exporting the scanned target vulnerabilities into file. • Different extension are possible to export like .pdf, .xml etc. • PDF will be used to submit to your higher management. • XML can be used to import in Metasploit for doing pen testing. • Also you can study by just clicking the vulnerability. OpenVAS_Group4_Chandrak-Melbin 49
  50. 50. StudyingVulnerability OpenVAS_Group4_Chandrak-Melbin 50
  51. 51. Exporting as file OpenVAS_Group4_Chandrak-Melbin 51
  52. 52. PDF file OpenVAS_Group4_Chandrak-Melbin 52
  53. 53. Exploitation onVulnerable System • Using NVTs, CVEs and Metasploit • Video on Denial of Service (DOS) on scanned results. OpenVAS_Group4_Chandrak-Melbin 53
  54. 54. Windows XP – No Firewall and Updates OpenVAS_Group4_Chandrak-Melbin 54
  55. 55. Windows XP - No Firewall and Updates OpenVAS_Group4_Chandrak-Melbin 55
  56. 56. VA OpenVAS_Group4_Chandrak-Melbin 56
  57. 57. Metasploit OpenVAS_Group4_Chandrak-Melbin 57
  58. 58. Metasploit OpenVAS_Group4_Chandrak-Melbin 58
  59. 59. OpenVAS_Group4_Chandrak-Melbin 59
  60. 60. Step 5: Mitigation • As per references provided by OpenVAS, • Patching the updates and Firewall protected. OpenVAS_Group4_Chandrak-Melbin 60
  61. 61. Windows XP – Firewall and Auto Updates OpenVAS_Group4_Chandrak-Melbin 61
  62. 62. VA OpenVAS_Group4_Chandrak-Melbin 62
  63. 63. Metasploit OpenVAS_Group4_Chandrak-Melbin 63
  64. 64. OpenVAS_Group4_Chandrak-Melbin 64 Question ???

    Be the first to comment

    Login to see the comments

  • antivirusspam

    Apr. 23, 2017
  • shreyansp

    Sep. 7, 2017
  • vaibhavdabhi

    Sep. 7, 2017
  • PreetBarochiya

    Sep. 17, 2017
  • MeghaChovatiya1

    Sep. 26, 2017
  • karolkuczynski

    Mar. 5, 2018
  • hninhtethtetaung39

    Jun. 19, 2018
  • AagnaDalal

    Aug. 23, 2018
  • VarunMehta29

    Aug. 23, 2018
  • MaheshKumar633

    Aug. 16, 2019
  • AliciaMontgomery4

    Mar. 3, 2021

Its an open source vulnerability scanner based on Nessus. Very useful in home and small scale companies to implement and check the system, network and devices vulnerabilities.

Views

Total views

4,739

On Slideshare

0

From embeds

0

Number of embeds

2

Actions

Downloads

335

Shares

0

Comments

0

Likes

11

×