Hello my friends, I will talk about the installation and usage of OPENVAS tool, which is a professional vulnerability scanner.

WHAT'S OPENVAS?

OPENVAS is a professional vulnerability scanner already available in the Kali Linux. Its most important features are that it is free and easy to use. With OPENVAS, all systems such as Windows, Linux, etc. can be scanned. These scans can be recorded on the program, automatic scanning and timed scanning can be done.

OPENVAS'S FEAUTURES

* Can scan multiple target computers at the same time.
* Supports SSL for OTP
* Possible to stop, continue and pause the scanning task
* Includes Master-Slave mode that allows you to control many samples from a single center
* It has its own web server (microhttp) so it doesn't need an extra server
* Online help system is available, you can get instant help.
* Multiple language option is available.

Installing OPENVAS

1-) To install from the repository, we type the following command in the Linux command line.

Kod:
apt install openvas -y




2-)Openvas is now installed, but we use the following code to get our username and password, to configure Openvas' configuration.


Kod:
openvas-setup




3-) OPENVAS gives us our username and password information at the bottom of the page so that we can log in while configuring the configuration;





4-) OPENVAS home page appears. We log in with the username and password information we received during configuration settings;





5-) In order to change the username, password information and edit the user as we want, we enter the Administration-Users.;








Now the user settings are finished, we can start using them;


VULNERABILITY SCREENING IN THE TARGET SYSTEM WITH OPENVAS


1-) When we type openvas-start on the Linux command line, the web site that Openvas program is connected to will come directly to us. The page was opened automatically in the first installation. To browse while on the home screen, Scans =>Tasks ;





2-) We click on the blue star shapep place and say New Tasks ;





3-) Here, we click on the blue star to enter a new target and customize parts such as scan type ;





4-) On the new target page that opens, it will be useful to select the target name, target domain or IP and scan type, select 1000 UDP and all TCP ports. Here we create with Create ;





5-) After determine our target, we give a name to our target file and create it with Create.





6-) With the Start button, we start the scan to the target, this process can take up to half an hour. The biggest factor here is the performance of your computer and your internet speed.





Note: If you set the "No auto" on the top right of the page to 30 seconds, the page will ******* itself every 30 seconds.


7-) Yes, our scan has finished. All vulnerabilities of the target are listed in the Result section.





We can see the vulnerabilities and how to exploit these vulnerabilities in detail from the headings here.







Source: https://www.turkhackteam.org/siber-g...i-tespiti.html
Translator: @Dolyetyus