Tryhackme OpenVAS
Tryhackme OpenVAS
Introduction
This section will contain all information and vulnerability tests that
come from the Greenbone Community Feed that will be the main
baseline for testing against systems. This can also include User Data
provided by the user in place of Greenbone NVTs and SCAP CERTs.
This is what you interact with when you navigate to OpenVAS in your
browser. The web interfaces are built off of the Greenbone Security
Assistant and make life easier for an analyst or operator when working
with OpenVAS or other forms of scanners through the GVM.
Installing OpenVAS
Installing from source is the least preferred option for beginners and
the least optimized way of installing OpenVAS due to prerequisites and
make errors. For more information about installing from source look at
the INSTALL.MD.
Docker is by far the easiest of all three installation methods and only
requires one command to be run to get the client started. For this
installation procedure, you will need docker installed
just in case you docker container in not working after restart your
machine which mean it service is shutdown there for we need to start
the docker container
Scanning Infrastructure
Now that we know that everything is working we can get into the nitty-
gritty of OpenVAS and how it works. Deploy the machine and navigate
to Scans > Tasks to begin creating a task to scan the provided machine.
Creating a Task
Once you select New Task from the dropdown you will be met with a
large pop-up with many options. We will break down each of the
options sections and what they can be used for.
For this task, we will be focusing only on the Name, Scan Targets, and
Scanner Type, and Scan Config. In later tasks, we will be focusing on
the other options for more advanced configuration and
implementation/automation.
1. Name: Allows us to set the name the scan will be known as inside
of OpenVAS
2.Scan Targets: The targets to scan, can include Hosts, Ports, and
Credentials. To create a new target you will need to follow
another pop-up, this will be covered later in this task.
4.Scan Config: OpenVAS has seven different scan types you can
select from and will be used based on how you aggressive or
what information you want to collect from your scan.
To scope a new target, navigate to the star icon next to Scan Targets.
Above is the menu for configuring a new target. The two main options
you will need to configure are the Name and the Hosts. This procedure
is fairly straight forward and other options will only be used in
advanced vulnerability management solutions. These will be covered in
later tasks.
Now that we have our target scoped we can continue to create our task
and begin the scan.
Once you create the task you will be brought back to the scan
dashboard where you can monitor and start your task. To start the task
navigate to the start icon under Actions.
Read the above and complete your scan on DVWA to test scanning
remote infrastructure
MS17–010
Send the crafted SMB transaction request with fid = 0 and check the
response to confirm the vulnerability.