Updating nessus plugins

In Depth Defense LLC is a privately owned Information Security Consulting company owned and operated by Mark Baggett.

In Depth Defense specializes in Penetration Testing and Incident Response.

updating nessus plugins-12

This is a great alternative to Nessus, and some of the other commercial security scanners like Nexpose, Qualys Guard etc.

Let’s get started: we have to login as a root user to install openvas package First you need to add atomic repository to install openvas as follows email protected] ~]# wget -q -O - |sh Atomic Free Unsupported Archive installer, version 2.0.15 BY INSTALLING THIS SOFTWARE AND BY USING ANY AND ALL SOFTWARE PROVIDED BY ATOMICORP LIMITED YOU ACKNOWLEDGE AND AGREE: For supported software packages please purchase a Nucleus license: https:// atomic repository rpms are UNSUPPORTED. (yes/no) [Default: yes] yes Configuring the [atomic] yum archive for this system Installing the Atomic GPG keys: OK Downloading atomic-release-1.0-20.el7noarch.rpm: Preparing...

################################# [100%] Updating / installing... 1:atomic-release-1.0-20.el7################################# [100%] OK Enable repo by default?

(yes/no) [Default: yes]: yes The Atomic Rocket Turtle archive has now been installed and configured for your system The following channels are available: atomic - [ACTIVATED] - contains the stable tree of ART packages atomic-testing - [DISABLED] - contains the testing tree of ART packages atomic-bleeding - [DISABLED] - contains the development tree of ART packages [[email protected] ~]# yum -y install openvas Loaded plugins: fastestmirror, langpacks atomic | 3.4 k B base | 3.6 k B extras | 3.4 k B updates | 3.4 k B (1/5): base/7/x86_64/group_gz | 155 k B (2/5): extras/7/x86_64/primary_db | 117 k B (3/5): updates/7/x86_64/primary_db | 4.1 MB (4/5): base/7/x86_64/primary_db | 5.3 MB (5/5): atomic/7/x86_64/primary_db | 847 k B Determining fastest mirrors * atomic: mirror1.34* base: * extras: * updates: Resolving Dependencies -- Finished Dependency Resolution Dependencies Resolved ==================================================================================== Package Arch Version Repository Size ==================================================================================== Installing: openvas noarch 1.0-22.el7atomic 15 k Installing for dependencies: dirb x86_64 221-2.el7atomic 46 k Dependency Updated: nmap-ncat.x86_64 2:6.47-8.el7Complete!

[[email protected] ~]# Step 2: Configure GSAD The Greenbone Security Assistant is a Web Based front end for managing scans. [Default: yes] Redirecting to /bin/systemctl restart gsad.service Step 3: Choose the GSAD admin users password.

[[

By default it is configured to only allow connections from localhost. The admin user is used to configure accounts, Update NVT's manually, and manage roles.Enter administrator username [Default: admin] : Enter Administrator Password: Verify Administrator Password: Empty password not allowed.Enter Administrator Password: Verify Administrator Password: Redirecting to /bin/systemctl start redis.service Setup complete, you can now access GSAD at: https:// Go to your web browser, type the url as https://ipaddress:9392(here my ip address is .37) default username is admin and enter the password entered during setup, and you should be able to login.To start a scan, enter an IP in the start scan area.Click on the task details, Check the report by clicking on Immediate scan.You can also configure the report format by going into Configuration section.

Comments are closed.