

Click the blue icon in the top left corner to create a new target.Īfter hitting the new target button, a dialog screen appears where we have to enter the following information:.Go to ‘Configuration’ in the top menu and select ’Targets’.To create a target, we need to follow 2 steps: This newly created target is selected in the following step where we configure a scanning task. The first step is to create and configure a target using the OpenVAS/Greenbone Security Assistant web interface. Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations.Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network.Vulnerability Scanning with OpenVAS 9 part 2: Vulnerability Scanning.Vulnerability Scanning with OpenVAS 9 part 1: Installation & Setup.Vulnerability Scanning with OpenVAS 9 Tutorials Tip: Did you forgot to write down or change your OpenVAS admin password? Check out the installation tutorial to find out how to reset the admin password.

Now that we’ve got everything up and running, let’s start with configuring a target and a scan task. Kali Linux 2018.2 VM with OpenVAS 9.0 installed (192.168.65.128).Īll virtual machines use the NAT network which can be configured in the network settings on the network adapter.Host machine with VMWare Workstation Pro 12.The lab setup used for this tutorial looks as follows: To follow along it is also recommended to have a vulnerable Metasploitable machine up and running that is accessible from the OpenVAS appliance or the Kali Linux VM you’ve installed OpenVAS on. If you haven’t done this at this point I recommend to follow part 1 of vulnerability scanning with OpenVAS first. If you don’t know how to install Metasploitable you can check out the installation tutorial for Metasploitable 2 (scroll down a bit) or Metasploitable 3.īefore we can actually start vulnerability scanning with OpenVAS 9, we have to complete the following tasks:Īt this point of the tutorial you need to have OpenVAS 9.0 installed and configured. For demonstration purposes we’ve also installed a virtual machine with Metasploitable 2 which we’ll target with OpenVAS.

In this tutorial we will learn how to configure and run a vulnerability scan.

Is the previous tutorial Vulnerability Scanning with OpenVAS 9.0 part 1 we’ve gone through the installation process of OpenVAS on Kali Linux and the installation of the virtual appliance.
