I wanted to run a vulnerability scan against my home lab to see if snort catches the event (snort setup OpenVAS. From their site:

OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.

From their software page here are the components of OpenVAS:

openvas components OpenVAS on CentOS

The software looked good to me, so I decided to install OpenVAS on CentOS.

Install OpenVAS on CentOS

Most of the instructions are laid out in OpenVAS for CentOS via Atomic. You just need to enable the atomic YUM repository:

wget -q -O - | sudo sh

Get the installer first to see what it does (for those who don’t just want to run an unknown script from the web). When I was installing ossec (check out the post on that here), I ended up doing that (so I already that had YUM repository enabled). Then to install the software, run the following:

elatov@ccl:~$sudo yum install openvas

After the install is finished, run the following to set it up:

elatov@ccl:~$sudo openvas-setup
[i] Initializing CERT advisory database
[i] Updating /var/lib/openvas/cert-data/dfn-cert-2008.xml
[i] Updating /var/lib/openvas/cert-data/dfn-cert-2009.xml
[i] Updating /var/lib/openvas/cert-data/dfn-cert-2010.xml
[i] Updating /var/lib/openvas/cert-data/dfn-cert-2011.xml
[i] Updating /var/lib/openvas/cert-data/dfn-cert-2012.xml
[i] Updating /var/lib/openvas/cert-data/dfn-cert-2013.xml

[i] Initializing scap database
[i] Updating CPEs
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2002.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2003.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2004.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2005.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2006.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2007.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2008.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2009.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2011.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2012.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2013.xml
[i] Updating /var/lib/openvas/scap-data/nvdcve-2.0-2014.xml
[i] Updating CVSS scores and CVE counts
[i] Updating OVAL data
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/c/oval.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/i/oval.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/m/oval.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/p/oval.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/v/family/ios.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/v/family/macos.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/v/family/pixos.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/v/family/unix.xml
[i] Updating /var/lib/openvas/scap-data/oval/5.10/org.mitre.oval/v/family/windows.xml
[i] No user data directory '/var/lib/openvas/scap-data/private' found.
Updating OpenVAS Manager database....
Step 2: Configure GSAD
The Greenbone Security Assistant is a Web Based front end
for managing scans. By default it is configured to only allow
connections from localhost.

Allow connections from any IP? [Default: yes] no
Stopping greenbone-security-assistant:                     [  OK  ]
Starting greenbone-security-assistant:                     [  OK  ]

Step 3: Choose the GSAD admin users password.
The admin user is used to configure accounts,
Update NVT's manually, and manage roles.

Enter administrator username [Default: admin] :
Enter Administrator Password:
Verify Administrator Password:

ad   main:MESSAGE:8686:2014-04-08 11h55.21 MDT: No rules file provided, the new user will have no restrictions.
ad   main:MESSAGE:8686:2014-04-08 11h55.21 MDT: User admin has been successfully created.

Step 4: Create a user

Using /var/tmp as a temporary file holder.

Add a new openvassd user

Login : user
Authentication (pass/cert) [pass] :
Login password :
Login password (again) :

User rules
openvassd has a rules system which allows you to restrict the hosts that openvas has the right to test.
For instance, you may want him to be able to scan his own host only.

Please see the openvas-adduser(8) man page for the rules syntax.

Enter the rules for this user, and hit ctrl-D once you are done:
(the user can have an empty rules set)

Login             : user
Password          : ***********

Rules             :

Is that ok? (y/n) [y] y
user added.

Starting openvas-administrator...
Starting openvas-administrator:           [  OK  ]

Setup complete, you can now access GSAD at:


If you want you can manually get the NVT signatures:

elatov@ccl:~$sudo openvas-nvt-sync
[i] This script synchronizes an NVT collection with the 'OpenVAS NVT Feed'.
[i] The 'OpenVAS NVT Feed' is provided by 'The OpenVAS Project'.
[i] Online information about this feed: ''.
[i] NVT dir: /var/lib/openvas/plugins
[i] Will use rsync
[i] Using rsync: /usr/bin/rsync
[i] Configured NVT rsync feed: rsync://
[w] Private directory '/var/lib/openvas/plugins/private' not found.
[w] Non-feed NVTs not migrated there will be deleted by rsync.
Run migration now ([y/n], any other input aborts)? y

[i] Migrating non-OpenVAS files to private sub-directory 'private' of NVT directory '/var/lib/openvas/plugins'. This can take a few minutes.
[i] Migration done.
OpenVAS feed server -
This service is hosted by Intevation GmbH -
All transactions are logged.
Please report problems to

receiving incremental file list
deleting nvt/
deleting gsf/

sent 64 bytes  received 1365947 bytes  248365.64 bytes/sec
total size is 185148946  speedup is 135.54
[i] Checking dir: ok
[i] Checking MD5 checksum:

Before you start the software, we will need to rebuild the database:

elatov@ccl:~$sudo openvasmd --rebuild

After that we can start the scanner:

elatov@ccl:~$sudo service openvas-scanner start
Starting openvas-scanner: base gpgme-Message: Setting GnuPG homedir to '/etc/openvas/gnupg'
base gpgme-Message: Using OpenPGP engine version '2.0.14'

At this point all the components should be up and running:

elatov@ccl:~$sudo service openvas-administrator status
openvas-administrator (pid  25590) is running...
elatov@ccl:~$sudo service openvas-scanner status
openvassd (pid  14431) is running...
elatov@ccl:~$sudo service openvas-manager status
openvas-manager (pid  14442) is running...
elatov@ccl:~$sudo service gsad status
gsad (pid  8681) is running...

If you need to make sure the configuration is all good, you can run the following:

elatov@ccl:~$sudo /usr/bin/openvas-check-setup

Running a scan with OpenVAS

Go to the GreenBone Security Assistant (https://IP:9293) and you should see the following:

greenbone assistant OpenVAS on CentOS

After logging in you should see the following:

gsa first page OpenVAS on CentOS

Then add a target host, by going to Configuration -> Targets:

gsa conf targets OpenVAS on CentOS

Then click on the star to add a target:

gsa new target button OpenVAS on CentOS

Fill out all the information:

gsa new target filled out OpenVAS on CentOS

Then click on “Create Target” and you should see your new target added:

gsa list of targets OpenVAS on CentOS

Then let’s create a task to run a scan against our newly created target. Go to Scan Management -> New Task:

gsa sm nt OpenVAS on CentOS

Then fill out all the information:

new task filledout OpenVAS on CentOS

Click on “Create Task” and the task should be ready:

task created OpenVAS on CentOS

BTW here are all the available scan configuration from the default install:

scan configuration gsa OpenVAS on CentOS

Lastly click on the play button to start the scan:

start scan button gsa OpenVAS on CentOS

Here is the scan kicked off:

scan started OpenVAS on CentOS

Getting OpenVAS Scan Results

After the scan is finished, you will see the following under the Tasks section:

scan finished OpenVAS on CentOS

Click on the scan and you will see the details:

task details gsa OpenVAS on CentOS

Then click on the “Magnifying Glass” (to see the details of the report) and you will see the following:

report details gsa OpenVAS on CentOS

From there you can download the the PDF version of the scan results.

Fixing the Watipi and Arachni Warnings

Initially I was see the following warnings on my scan results:

arachni missing in results OpenVAS on CentOS

Arachni could not be found in your system path.

And also the following:

wapiti empty report OpenVAS on CentOS

wapiti report filename is empty.

For the arachni one, I actually didn’t have that installed. To install that, get the package:


Then extract the software:

elatov@ccl:~$tar xzvf arachni-0.4.6-0.4.3-linux-x86_64.tar.gz

Lastly install in under /usr/local:

elatov@ccl:~$sudo mv arachni-0.4.6-0.4.3 /usr/local/.

For ease of use, let’s create a symlink:

elatov@ccl:~$sudo ln -s /usr/local/arachni-0.4.6-0.4.3 /usr/local/arachni

Then lastly symlink the binaries under /usr/bin:

elatov@ccl:~$sudo ln -s /usr/local/arachni/bin/arachni* /usr/bin/
elatov@ccl:~$sudo ln -s /usr/local/arachni/bin/ /usr/bin/

After that it started working, and I saw the following in my reports:

arachni results included i OpenVAS on CentOS

For wapiti, I had the package for that installed:

elatov@ccl:~$rpm -qa | grep wapiti

But it wasn’t working for some reason. I ran the scan manually:

elatov@ccl:~$sudo openvas-nasl -t localhost -T log -X -i /var/lib/openvas/plugins /var/lib/openvas/plugins/remote-web-wapiti.nasl

and then I realized I was missing a python module. Not sure why it wasn’t installed. Upon installing the following:

elatov@ccl:~$sudo yum install python-requests

and then running the command again, I saw the following:

elatov@ccl:~$sudo openvas-nasl -t localhost -T log -X -i /var/lib/openvas/plugins /var/lib/openvas/plugins/remote-web-wapiti.nasl
Here is the wapiti report:
                     Wapiti 2.3.0 -
                        Report for
              Date of the scan : Tue, 15 Apr 2014 22:21:40 +0000
                          Scope of the scan : folder
Summary of vulnerabilities :

                                Anomalies found:

--- End of report ---

It looks like it worked this time around. Running another scan and the results showed the same:

watipi results included i1 OpenVAS on CentOS

Checking out the Progress of a Scan

You can enable extra logging on the scanner. Here is the option for that:

elatov@ccl:~$grep log_whole_attack /etc/openvas/openvassd.conf
log_whole_attack = yes

After that’s enabled, stop the service and then start it back up:

elatov@ccl:~$sudo service openvas-scanner stop
elatov@ccl:~$sudo service openvas-scanner start

Then if you start another scan, you will see the following in the logs:

elatov@ccl:~$tail /var/log/openvas/openvassd.log
[Tue Apr 15 21:47:47 2014][999] user om starts a new scan. Target(s) :, with max_hosts = 20 and max_checks = 4
[Tue Apr 15 21:47:47 2014][999] user om : testing (::ffff: [1049]
[Tue Apr 15 21:47:47 2014][1049] user om : new KB will be saved as /var/lib/openvas/users/om/kbs/

Then if you check out the KB file, you will see all the events:

elatov@ccl:~$sudo tail -f /var/lib/openvas/users/om/kbs/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 3 Launched/
1397586988 1 SentData/ is the wapiti report
***\n                     Wapiti 2.3.0 -\n
       Report for\n              Date of the scan : Tue
, 15 Apr 2014 18:36:19 +0000\n                          Scope of the scan : fold
****\nSummary of vulnerabilities :\n----------------------------\n**************
                      Anomalies found:\n\n\n--- End of report ---
1397586988 3 Launched/
1397586988 3 Launched/

Limiting the Cron Jobs for OpenVAS

By default the following rules are added by the openvas install:

elatov@ccl:~$ls -l /etc/cron.d/openvas*
-rw-r--r-- 1 root root 119 Apr  9 10:12 /etc/cron.d/openvas-sync-cert
-rw-r--r-- 1 root root  85 Jun 28  2010 /etc/cron.d/openvas-sync-plugins
-rw-r--r-- 1 root root 136 Apr 15 09:53 /etc/cron.d/openvas-sync-scap

The rsync was causing an IO spike on my little VM, so I decided to limit the IO and CPU usage of the sync (by prepending the sync with a nice and ionice commands):

elatov@ccl:~$cat /etc/cron.d/openvas-sync-scap
# start plugin sync daily at 1am
0 1 * * * root /usr/bin/nice -n 19 /usr/bin/ionice -c2 -n7 /usr/sbin/openvas-scapdata-sync > /dev/null

Snort Catching the OpenVAS Scan

After I ran the scan against a web server, I saw snort catching the scan right away:

snort catching openvas scan i2 OpenVAS on CentOS

I was also running ossec with active-responses enabled, that blocked the IP of the scanner right away.