{"id":1063,"date":"2012-08-22T16:21:41","date_gmt":"2012-08-22T08:21:41","guid":{"rendered":"http:\/\/rmohan.com\/?p=1063"},"modified":"2012-08-22T16:22:33","modified_gmt":"2012-08-22T08:22:33","slug":"openvas-5-installation-on-centos-6-2","status":"publish","type":"post","link":"https:\/\/mohan.sg\/?p=1063","title":{"rendered":"OpenVAS 5 Installation on CentOS 6.2"},"content":{"rendered":"<p>OpenVAS 5 Installation on CentOS 6.2<\/p>\n<p>Install Centos 6.2 Minimal<\/p>\n<p>OS: CentOS 6.2 32bit<br \/>Hardware: Virtual Machine (VirtualBox 4.1.14)<br \/>OpenVAS: 5<\/p>\n<p>About<\/p>\n<p>OpenVAS is an opensource vulnerability network scanner. <br \/>OpenVAS let you scan your network for vulnerabilities and create a report on your network status.<\/p>\n<p>Prerequisite<\/p>\n<p>\u00a0\u00a0\u00a0 Disable SELINUX<\/p>\n<p>vi \/etc\/selinux\/config<\/p>\n<p>&#8230;<br \/>SELINUX=disabled<br \/>&#8230;<\/p>\n<p>Disable the firewall<\/p>\n<p>\u00a0Install wget<\/p>\n<p>yum install wget -y<\/p>\n<p>\u00a0\u00a0\u00a0 Update your Operating System and reboot<\/p>\n<p>yum update -y <br \/>reboot<\/p>\n<p>OpenVAS Installation<\/p>\n<p>\u00a0\u00a0\u00a0 Install atomic repository<\/p>\n<p>wget -q -O &#8211; http:\/\/www.atomicorp.com\/installers\/atomic |sh<\/p>\n<p>Atomic Archive installer, version 2.0.3<\/p>\n<p>BY INSTALLING THIS SOFTWARE AND BY USING ANY AND ALL SOFTWARE<br \/>PROVIDED BY ATOMICORP LIMITED YOU ACKNOWLEDGE AND AGREE:<\/p>\n<p>THIS SOFTWARE AND ALL SOFTWARE PROVIDED IN THIS REPOSITORY IS<br \/>PROVIDED BY ATOMICORP LIMITED AS IS, IS UNSUPPORTED AND ANY<br \/>EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE<br \/>IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR<br \/>PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ATOMICORP LIMITED, THE<br \/>COPYRIGHT OWNER OR ANY CONTRIBUTOR TO ANY AND ALL SOFTWARE PROVIDED<br \/>BY OR PUBLISHED IN THIS REPOSITORY BE LIABLE FOR ANY DIRECT,<br \/>INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES<br \/>(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS<br \/>OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)<br \/>HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,<br \/>STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)<br \/>ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED<br \/>OF THE POSSIBILITY OF SUCH DAMAGE.<\/p>\n<p>Do you agree to these terms? (yes\/no) [Default: yes]<br \/>ENTER<\/p>\n<p>Installing the Atomic GPG key: OK<br \/>Downloading atomic-release-1.0-14.el6.art.noarch.rpm: OK<\/p>\n<p>The Atomic Rocket Turtle archive has now been installed and configured for your system<br \/>The following channels are available:<br \/>\u00a0 atomic\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8211; [ACTIVATED] &#8211; contains the stable tree of ART packages<br \/>\u00a0 atomic-testing\u00a0 &#8211; [DISABLED]\u00a0 &#8211; contains the testing tree of ART packages<br \/>\u00a0 atomic-bleeding &#8211; [DISABLED]\u00a0 &#8211; contains the development tree of ART packages<\/p>\n<p>\u00a0\u00a0\u00a0 Install OpenVAS<\/p>\n<p>yum install openvas -y<\/p>\n<p>\u00a0\u00a0\u00a0 Run openvas-setup to configure OpenVAS<\/p>\n<p>openvas-setup<\/p>\n<p>Openvas Setup, Version: 0.1<\/p>\n<p>Step 1: Update NVT&#8217;s<br \/>Please note this step could take some time.<br \/>Once completed, NVT&#8217;s will be updated automatically every 24 hours<\/p>\n<p>Updating NVTs&#8230;.<br \/>Stopping openvas-scanner:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 [\u00a0 OK\u00a0 ]<br \/>Starting openvas-scanner:<br \/>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 [\u00a0 OK\u00a0 ]<br \/>Updating OpenVAS Manager database&#8230;.<\/p>\n<p>Step 2: Configure GSAD<br \/>The Greenbone Security Assistant is a Web Based front end<br \/>for managing scans. By default it is configured to only allow<br \/>connections from localhost.<\/p>\n<p>Allow connections from any IP? [Default: yes] Stopping gree[\u00a0 OK\u00a0 ]curity-assistant:<br \/>Starting greenbone-security-assistant:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 [\u00a0 OK\u00a0 ]<\/p>\n<p>Step 3: Choose the GSAD admin users password.<br \/>The admin user is used to configure accounts,<br \/>Update NVT&#8217;s manually, and manage roles.<\/p>\n<p>Enter password: enter password for admin user<br \/>ENTER<\/p>\n<p>&nbsp;<\/p>\n<pre>ad   main:MESSAGE:3223:2012-01-19 11h09.05 IST: No rules file provided, the new user will have no restrictions.\r\nad   main:MESSAGE:3223:2012-01-19 11h09.05 IST: User admin has been successfully created.\r\n\r\nStep 4: Create a user\r\n\r\nUsing \/var\/tmp as a temporary file holder.\r\n\r\nAdd a new openvassd user\r\n---------------------------------\r\n\r\nLogin : <strong>humus<\/strong>\r\n<strong>ENTER<\/strong><br \/><br \/><\/pre>\n<pre>Authentication (pass\/cert) [pass] :\r\n<strong>ENTER<\/strong><\/pre>\n<pre>Login password : <strong>enter user password<\/strong>\r\n<strong>ENTER<\/strong><\/pre>\n<pre>Login password (again) : <strong>enter user password again<\/strong>\r\n<strong>ENTER<\/strong><\/pre>\n<pre>User rules\r\n---------------\r\nopenvassd has a rules system which allows you to restrict the hosts that humus has the right to test.\r\nFor instance, you may want him to be able to scan his own host only.\r\n\r\nPlease see the openvas-adduser(8) man page for the rules syntax.\r\n\r\nEnter the rules for this user, and hit ctrl-D once you are done:\r\n(the user can have an empty rules set)\r\n<strong>ctrl-D<\/strong><\/pre>\n<pre>Login             : humus\r\nPassword          : ***********\r\n\r\nRules             :\r\n\r\nIs that ok? (y\/n) [y]\r\n<strong>ENTER<\/strong><\/pre>\n<pre>Setup complete, you can now access GSAD at:\r\n\r\nhttps:\/\/&lt;IP&gt;:9392<\/pre>\n<ul>\n<li>Start OpenVAS administrator<\/li>\n<\/ul>\n<pre>\/etc\/init.d\/openvas-administrator start<\/pre>\n<ul>\n<li>Download openvas-check-setup script and check OpenVAS setup<\/li>\n<\/ul>\n<pre>cd \/usr\/local\/src\/\r\nwget https:\/\/svn.wald.intevation.org\/svn\/openvas\/trunk\/tools\/openvas-check-setup -O openvas-check-setup.sh --no-check-certificate\r\nchmod +x openvas-check-setup.sh\r\n.\/openvas-check-setup.sh --server<\/pre>\n<ul>\n<li>Open Greenbone Security Assistent port in linux firewall<\/li>\n<\/ul>\n<pre>vi \/etc\/sysconfig\/iptables<\/pre>\n<pre>...\r\n-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT\r\n-A INPUT -m state --state NEW -m tcp -p tcp --dport 9392 -j ACCEPT\u00a0 \r\n...<\/pre>\n<pre>service iptables restart<\/pre>\n<ul>\n<li>Connect to OpenVAS server\n<ul>\n<li>Using a web browser browse to https:\/\/<em>openvas_server_IP<\/em>:9392<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>That\u2019s it. OpenVAS server installation completed. You can create new scans on your network and schdule them to run frequently and check their reports<em>.<\/em><\/p>\n<p>For more information on OpenVAS visit\u00a0<a href=\"http:\/\/www.openvas.org\/\">http:\/\/www.openvas.org<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OpenVAS 5 Installation on CentOS 6.2<\/p>\n<p>Install Centos 6.2 Minimal<\/p>\n<p>OS: CentOS 6.2 32bitHardware: Virtual Machine (VirtualBox 4.1.14)OpenVAS: 5<\/p>\n<p>About<\/p>\n<p>OpenVAS is an opensource vulnerability network scanner. OpenVAS let you scan your network for vulnerabilities and create a report on your network status.<\/p>\n<p>Prerequisite<\/p>\n<p> Disable SELINUX<\/p>\n<p>vi \/etc\/selinux\/config<\/p>\n<p>&#8230;SELINUX=disabled&#8230;<\/p>\n<p>Disable the firewall<\/p>\n<p> Install [&#8230;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"_links":{"self":[{"href":"https:\/\/mohan.sg\/index.php?rest_route=\/wp\/v2\/posts\/1063"}],"collection":[{"href":"https:\/\/mohan.sg\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mohan.sg\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mohan.sg\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mohan.sg\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1063"}],"version-history":[{"count":2,"href":"https:\/\/mohan.sg\/index.php?rest_route=\/wp\/v2\/posts\/1063\/revisions"}],"predecessor-version":[{"id":1066,"href":"https:\/\/mohan.sg\/index.php?rest_route=\/wp\/v2\/posts\/1063\/revisions\/1066"}],"wp:attachment":[{"href":"https:\/\/mohan.sg\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mohan.sg\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mohan.sg\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}