OpenVAS是类似Nessus的综合型漏洞扫描器,可以用来识别远程主机、Web应用存在的各种漏洞。Nessus曾经是业内开源漏洞扫描工具的标准,在Nessus商业化不再开放源代码后,在它的原始项目中分支出OpenVAS开源项目。经过多年的发展,OpenVAS已成为当前最好用的开源漏洞扫描工具,功能非常强大,甚至可以与一些商业的漏洞扫描工具媲美。OpenVAS使用NVT(Network Vulnerabilty
Test,网络漏洞测试)脚本对多种远程系统(包括Windows、Linux、UNIX以及Web应用程序等)的安全问题进行检测
openvas
Openvas-安装最新版
1.dpkg-query
-l | grep openvas* 查看已经安装的组件
2.删除原有文件 apt-get autoremove openvas
3.安装依赖项
apt-get
install nsis alien
rpm texlive-latex-extralibqt4-dev
g++ libmicrohttpd-dev
libxml2-devlibxslt1-dev libxml2-dev
libsqlite3-dev doxygen sqlfairy xmltoman
sqlite3 gcc pkg-config libssh-dev libgnutls-dev libglib2.0-devlibpcap-dev libgpgme11-dev uuid-devbison libksba-dev
zlib1g-devlibldap2-dev xsltproc
l3.安装wmi
lmkdiropenvasfix
l#wget
http://www.openvas.org/download/wmi/wmi-1.3.14.tar.bz2
l#
tarxjvfwmi-1.3.14.tar.bz2
l#cdxjvf
wmi-1.3.14
l#wget
http://www.openvas.org/download/wmi/openvas-wmi-1.3.14.patch
l#wget
http://www.openvas.org/download/wmi/openvas-wmi-1.3.14.patch2
l#wget
http://www.openvas.org/download/wmi/openvas-wmi-1.3.14.patch3
l# patch -p1
l# patch -p1
l# patch -p1
l#apt-get
installautoconf
l#apt-get
installcmake
l# cd Samba/source/
l#
./autogen.sh
l#./configure
l# make proto all
l# make libraries
l#
bashinstall-libwmiclient.sh
l#
bashinstall-libwincmd.sh
5.安装 openvas scanner
# wgethttp://wald.intevation.org/frs/download.php/1686/openvas-scanner-4.0.2.tar.gz
#
tar xzvf
openvas-scanner-4.0.2.tar.gz
#
cdopenvas-scanner-4.0.2/
# cmake .
#
make
# make
install
4.安装openvaslibraries
# wgethttp://wald.intevation.org/frs/download.php/1682/openvas-libraries-7.0.3.tar.gz
#
tar xzvf
openvas-libraries-7.0.3.tar.gz
#
cd cd openvas-libraries-7.0.3/
# cmake .
#
make
# make
install
6.安装openvas manager
# wgethttp://wald.intevation.org/frs/download.php/1690/openvas-manager-5.0.3.tar.gz
#
tar xzvf
openvas-manager-5.0.3.tar.gz
#
cdopenvas-manager-5.0.3/
# cmake .
#
make
# make
install
l7.安装Greenbone Security
Assistant (GSA)
# wgethttp://wald.intevation.org/frs/download.php/1694/greenbone-security-assistant-5.0.2.tar.gz
#
tar xzvf
greenbone-security-assistant-5.0.2.tar.gz
#
cdgreenbone-security-assistant-5.0.2/
# cmake .
#
make
# make
install
l8. 安装Command Line
Interface(CLI)
# wgethttp://wald.intevation.org/frs/download.php/1633/openvas-cli-1.3.0.tar.gz
#
tar xzvf
openvas-cli-1.3.0.tar.gz
#
cdopenvas-cli-1.3.0/
# cmake .
#
make
# make
install
9. 创建证书
openvas-mkcert
10. 生成客户端证书
openvas-mkcert-client -n -i
11.更新配置
ldconfig
12.更新nvt
openvas-nvt-sync
13.更新scapdata
openvas-scapdata-sync
14.更新certdata
lopenvas-certdata-sync
15.启动scanner
openvassd
16.重建数据库
openvasmd --rebuild
--progress
17.启动manager
openvasmd
openvasmd --create-user=admin
--role=Admin
19.启动gsa
gsad
20.check-setup
l# wget
––no-check-certificatehttps://svn.wald.intevation.org/svn/openvas/trunk/tools/openvas-check-setup
# chmod
755 openvas-check-setup
./openvas-check-setup
Openvas启动
openvassd
gsad
openvasmd
Openvas-客户端
https://127.0.0.1/login/login.html
OpenVas漏洞分析的步骤
1.创建config
2.创建Target
3.创建Task
4.启动scan
5.查看报告
实例:扫描windows系统漏洞
1. 使用zmap扫描一个网段内打开3389端口的主机
2. 使用OpenVas对目标主机进行漏洞分析