OPENVAS

Network Mapper

OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test.

The scanner obtains the tests for detecting vulnerabilities from a feed that has a long history and daily updates.

OpenVAS has been developed and driven forward by the company Greenbone since 2006. As part of the commercial vulnerability management product family Greenbone Enterprise Appliance, the scanner forms the Greenbone Community Edition together with other open-source modules.


DOWNLOADS

SYSTEM REQUIREMENTS

RAM : Minimum 2 GB; recommended 4 GB or more for large-scale scans.

Storage : Requires at least 20 GB of disk space for installation and storing scan data.

OS : Compatible with Linux (native support). Can be used on Windows via virtualization or Windows Subsystem for Linux (WSL).

Architecture : Supports 64-bit systems.

Available On : PC


ADDITIONAL INFORMATION

Published By

Greenbone Networks.

Release Date

2006

Approximate Size

Around 1 GB for installation, but additional space is needed for scan data.

Publisher Info

Greenbone Networks specializes in vulnerability management and security solutions.

Supported Languages

English

Last Update

Regularly updated, the latest version is from 2023.

Programming Language

Written in C and Python.

Operating System

Cross-platform

License

Open Source under the GNU General Public License (GPL).

  • Issue Tracking
  • Automated Scans
  • Compliance Testing
  • Perimeter Scanning
  • Configuration Monitoring
  • Manual Application Testing
  • Static Code Analysis
  • Black Box Testing

  1. Target Selection : Users specify the systems or networks they want to scan.
  2. Scan Configuration : Users define scan parameters, such as the type of vulnerabilities to check.
  3. Scanning Process : OpenVAS uses a database of known vulnerabilities to analyze the target system.
  4. Detection & Reporting : It identifies security weaknesses and generates detailed reports with recommendations for remediation.
Key Components :
  • OpenVAS Scanner : Performs the actual scanning using Network Vulnerability Tests (NVTs).
  • OpenVAS Manager : Manages scan configurations, schedules, and stores results.
  • Greenbone Security Assistant (GSA) : A web-based interface for managing scans and viewing results.
  • OpenVAS CLI : A command-line tool for advanced users.
  • Greenbone Security Feed (GSF) : Provides updated vulnerability tests to ensure OpenVAS detects the latest threats.

  • Comprehensive coverage for a free solution.
  • A dedicated community of developers.
  • Open-source and free of charge.
  • Support for multiple OS

OpenVAS (Open Vulnerability Assessment Scanner) is a powerful tool for vulnerability scanning and management. Here are some examples of its usage :

Basic Examples
  1. Run a Quick Scan : openvas-cli --target 192.168.1.1 --scan-type quick
  2. Performs a quick vulnerability scan on the target IP.

  3. Full Network Scan : openvas-cli --target 192.168.1.0/24 --scan-type full
  4. Scans an entire subnet for vulnerabilities.

  5. Export Scan Results : openvas-cli --export-format pdf --output results.pdf
  6. Exports the scan results in PDF format for reporting.

  7. Update Vulnerability Database : openvas-feed-update
  8. Ensures the latest vulnerability definitions are used for scans.

Advanced Examples
  1. Credentialed Scans:
    • Configure credentials (e.g., SSH or Windows credentials) in the OpenVAS interface.
    • Perform a credentialed scan to identify deeper vulnerabilities like missing patches or misconfigurations.
  2. Custom Scan Policies :
    • Create a custom scan policy to focus on specific vulnerabilities or exclude certain IPs/ports.
    • Use the policy during a scan : openvas-cli --target 192.168.1.1 --policy custom_policy
  3. Web Application Scanning :
    • Use OpenVAS to scan web applications for vulnerabilities like SQL injection or cross-site scripting (XSS).
  4. Integration with SIEM :
    • Integrate OpenVAS with a Security Information and Event Management (SIEM) tool to correlate scan results with other security events.
Practical Applications
  • Vulnerability Management : Identify and prioritize vulnerabilities in your network.
  • Compliance Auditing : Ensure systems meet regulatory and security standards.
  • Incident Response : Use OpenVAS to identify vulnerabilities exploited during a security breach.

  • Focal Fossa
  • Bionic Beaver
  • Trusty Tahr

Terminal Installation Commands ...

$ sudo apt install openvas

$ sudo apt -y install openvas


GUI Installation Steps ...
Linux
  1. Update your system : sudo apt update
  2. Install OpenVAS : sudo apt install openvas
  3. Run the setup script to download the latest vulnerability feed and complete the installation : sudo openvas-setup
  4. Start OpenVAS services :
  5. $ sudo systemctl start gvmd

    $ sudo systemctl start openvas-scanner

  6. Enable services at startup (optional but recommended) :
  7. $ sudo systemctl enable gvmd

    $ sudo systemctl enable openvas-scanner

Windows & MacOS

Installation with VirtualBox

  1. Download VirtualBox from here.
  2. Download the Greenbone Security Manager (GSM) virtual machine from Greenbone
  3. Import the GSM VM into VirtualBox.
  4. Configure network settings to ensure connectivity.
  5. Start the VM and log in using the default credentials.
  6. Access the OpenVAS web interface via your browser.

Installation with Docker

  1. Install Docker from Docker’s official site.
  2. Pull the OpenVAS image using : docker pull greenbone/openvas
  3. Run the container : docker run -d -p 443:443 greenbone/openvas
  4. Access OpenVAS via your browser at https://localhost.

Terminal Uninstallation Commands ...

$ sudo apt remove openvas

$ sudo apt autoclean && apt autoremove


GUI Uninstallation Steps ...
Linux
  1. Stop OpenVAS services :
  2. $ sudo systemctl stop gvmd

    $ sudo systemctl stop openvas-scanner

  3. Remove OpenVAS : sudo apt remove --purge openvas
  4. Clean up residual files (optional) :
  5. $ sudo rm -rf /var/lib/openvas

    $ sudo rm -rf /etc/openvas

Windows & MacOS
  1. For VirtualBox: Delete the GSM VM from VirtualBox.
  2. For Docker : Remove the container using : docker rm -f openvas
  3. Then remove the image : docker rmi greenbone/openvas

Copyright © 2025 HACKERSPOT

All original content, including tools, software, and other information, is protected by copyright and remains the property of its respective owners.

Subscribe for more Information
HACKERSPOT

HackerSpot is an informational platform that offers resources such as tools, software, courses, internships, and various other materials aimed at supporting individuals passionate about CyberSecurity and IT.

Contacts

Bapatla, Andhrapradesh, India 237101

bablunannam@gmail.com

+91 7995819235