Introduction
In today’s cybersecurity landscape, protecting your systems from vulnerabilities is paramount. With the prevalence of cyber threats, having a robust vulnerability assessment tool is crucial for ensuring the security of your network. One such tool that stands out is OpenVAS (Open Vulnerability Assessment System), an open-source vulnerability scanner that helps identify and manage security vulnerabilities in your infrastructure.
Why OpenVAS?
Before we delve into the installation process, let’s briefly discuss why OpenVAS is a preferred choice for vulnerability scanning:
Open Source: Being open-source means that OpenVAS is freely available for anyone to download and use, making it accessible to both individuals and organizations regardless of budget constraints.
Comprehensive Vulnerability Detection: OpenVAS boasts a vast database of known vulnerabilities, allowing it to effectively detect a wide range of security issues in your network infrastructure.
Regular Updates: The OpenVAS community actively maintains and updates the tool, ensuring that it stays current with the latest security threats and vulnerabilities.
Prerequisites
Before diving into the installation process, it’s essential to ensure that your system meets the necessary prerequisites to install and run OpenVAS effectively. Here are the prerequisites you’ll need:
Kali Linux: Make sure you have Kali Linux installed on your system. If you haven’t already installed Kali Linux, you can download it from the official Kali Linux website and follow the installation instructions.
Internet Connection: A stable internet connection is required to download the necessary packages and updates during the installation process.
Sufficient Resources: OpenVAS can be resource-intensive, so make sure your system has an adequate amount of RAM and CPU power to handle the scanning tasks effectively. It’s recommended to allocate at least 4GB of RAM to OpenVAS for optimal performance.
Installing OpenVAS on Kali Linux: Step-by-Step Instructions
With the prerequisites out of the way, let’s proceed with the installation process.
Update Your System
Before installing OpenVAS, it’s crucial to ensure that your system is up to date. Open a terminal window on your Kali Linux system and execute the following commands:
$ sudo apt update -y$ sudo apt upgrade -y$ sudo apt dist-upgrade -yThese commands will update the package lists and upgrade the installed packages to their latest versions, ensuring that your system is ready for the installation process.
Install OpenVAS
With your system updated, you can now proceed to install OpenVAS. OpenVAS is available in the official Kali Linux repositories, making the installation process straightforward. Simply run the following command in your terminal:
$ sudo apt install openvasThis command will download and install the OpenVAS packages along with any necessary dependencies, allowing you to proceed with the setup process seamlessly.
Initialize OpenVAS
Once the installation is complete, you’ll need to initialize OpenVAS by running the following command:
$ sudo gvm-setupThis command will configure the OpenVAS services and set up the necessary databases. Depending on your system’s resources, this process may take some time to complete, so be patient and let it finish.

Photo by admingeek from Infotechys
During the Greenbone Vulnerability Management (GVM) setup process, Notus and NASL files will be downloaded. The setup will conclude with the creation of an admin user and password. Please make a note of these credentials as you will need them later.
Verifying the GVM Setup
Once the GVM setup process is complete, confirm its status by running the following command:
$ sudo gvm-check-setupgvm-check-setup 23.11.0
Test completeness and readiness of GVM-23.11.0
Step 1: Checking OpenVAS (Scanner)...
OK: OpenVAS Scanner is present in version 22.7.9.
OK: Notus Scanner is present in version 22.6.2.
OK: Server CA Certificate is present as /var/lib/gvm/CA/servercert.pem.
Checking permissions of /var/lib/openvas/gnupg/*
OK: _gvm owns all files in /var/lib/openvas/gnupg
OK: redis-server is present.
OK: scanner (db_address setting) is configured properly using the redis-server socket: /var/run/redis-openvas/redis-server.sock
OK: the mqtt_server_uri is defined in /etc/openvas/openvas.conf
OK: _gvm owns all files in /var/lib/openvas/plugins
OK: NVT collection in /var/lib/openvas/plugins contains 88210 NVTs.
OK: The notus directory /var/lib/notus/products contains 456 NVTs.
Checking that the obsolete redis database has been removed
OK: No old Redis DB
OK: ospd-openvas service is active.
OK: ospd-OpenVAS is present in version 22.6.2.
Step 2: Checking GVMD Manager ...
OK: GVM Manager (gvmd) is present in version 23.1.0.
Step 3: Checking Certificates ...
OK: GVM client certificate is valid and present as /var/lib/gvm/CA/clientcert.pem.
OK: Your GVM certificate infrastructure passed validation.
Step 4: Checking data ...
OK: SCAP data found in /var/lib/gvm/scap-data.
OK: CERT data found in /var/lib/gvm/cert-data.
Step 5: Checking Postgresql DB and user ...
OK: Postgresql version and default port are OK.
gvmd | _gvm | UTF8 | libc | en_US.UTF-8 | en_US.UTF-8 | | |
16436|pg-gvm|10|2200|f|22.6||
OK: At least one user exists.
Step 6: Checking Greenbone Security Assistant (GSA) ...
OK: Greenbone Security Assistant is present in version 22.08.0~git.
Step 7: Checking if GVM services are up and running ...
OK: gvmd service is active.
OK: gsad service is active.
Step 8: Checking few other requirements...
OK: nmap is present.
OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work.
OK: nsis found, LSC credential package generation for Microsoft Windows targets is likely to work.
OK: xsltproc found.
WARNING: Your password policy is empty.
SUGGEST: Edit the /etc/gvm/pwpolicy.conf file to set a password policy.
Step 9: Checking greenbone-security-assistant...
OK: greenbone-security-assistant is installed
It seems like your GVM-23.11.0 installation is OK.Installing OpenVAS on Kali Linux: Accessing the OpenVAS Web Interface
After the initialization process is finished, you can access the OpenVAS web interface by opening your web browser and navigating to https://localhost:9392. You’ll be prompted to log in with the default username and password:
- Username:
admin - Password:
c690a81d-f930-4b1a-aea5-d4de301e663a
If the URL isn’t functioning properly for you, attempt to resolve the issue by restarting GVM services with the following commands:
$ sudo gvm-stop; sudo gvm-start[>] Please wait for the GVM services to start.
[>]
[>] You might need to refresh your browser once it opens.
[>]
[>] Web UI (Greenbone Security Assistant): https://127.0.0.1:9392Resetting the admin password
Furthermore, if you happen to forget or misplace your password, you can easily set a new one using the following command:
$ sudo runuser -u _gvm -- gvmd --user=admin --new-password=new_password
Photo by admingeek from Infotechys

Photo by admingeek from Infotechys

Photo by admingeek from Infotechys
Updating the Vulnerability Database
To ensure that OpenVAS is scanning for the latest security threats, it’s essential to keep the vulnerability database up to date. You can update the vulnerability database by running the following command:
$ sudo greenbone-feed-syncThis command will download the latest vulnerability data and update the OpenVAS database accordingly, ensuring that your scans are as accurate and comprehensive as possible.
User account administration
Run the following command to create a new user and password:
sudo runuser -u _gvm -- gvmd --create-user=newadmin --new-password=enter_new_passsword
No comments:
Post a Comment