OpenVAS ‐ Scans - mluchettii/github-wiki-mluchetti GitHub Wiki

Table of Contents

Scans

Configure a scan target

Click on the Configuration dropdown on the navigation bar to the left. Click on Targets and add a new target.

For my network scan, I want to scan every host that's connected to the router gateway, so in this case I use the following address and subnet mask: 192.168.1.81/24, _and naming the scan target 'Network'.

Configure a new scan

Network scan

Click on the Scans dropdown on the navigation bar. Click on Tasks and add a new task.

For my scan, I gave it the name 'First scan' and set 'Network' as the scan target. No other settings were modified. Depending on the amount of hosts on your network, and the amount of resources you allocated to the OpenVAS VM, the scan duration could be moderate to very long.

Immediate scan

Alternatively, one could click the magic wand icon on the top left on the Tasks page and have the application create a new Target and Task for a given IP address and start the scan right away. For this example, I started an immediate scan of my Raspberry Pi located at 192.168.1.14.

Reports

Both scans with the status 'Done'

Network scan report

As a result of this scan of my network, OpenVAS discovered 23 medium-ranked vulnerabilities and 15 low-ranked vulnerabilities.

Clicking on the task takes us to the report that is organized into different tabs.

The Results tab shows the vulnerabilities that were discovered.

Clicking on a vulnerability reveals more information, such as the detection method, impact, and solution. In this case, my PiHole server is being flagged for supporting unencrypted communications over HTTP. The solution would be to enforce secure communications via an encrypted SSL/TLS connection (HTTPS).

The hosts that were discovered.

Application vulnerability information.

Discovered operating systems, although Windows is missing.

CVE detections.

List of TLS certificates.