Vulnerability Scanner Setup and Configuration of OpenVAS Part 2
8 hours 49 minutes
everyone Welcome back to the course. So in the last video, we went ahead and loved Callie lyrics. We then also created our text file with our Nano command. And then we went ahead and loaded I p addresses in there so we could actually skin against those.
And then we wrapped up the that video with launching the open Voss tool, and we were in the process of launching it. And I went and Paul's video, as I mentioned, to take several minutes to go ahead and launch it. Once it does, it will launch Firefox's you see in the background there. And then we'll take you to the green Bone security assistant. Log in page right here in step 16.
So you'll see that in the background there in my machine. Now we're it steps 17 here. We're gonna go ahead and log into this particular page
so we'll log in with the user name of admin, and then the password is capital P, the at symbol and then lower case S S W.
The number zero and then lower case R D. So let's go and type that in now. So we're gonna type in admin all over case
and then we'll type on our password here. So capital P the at symbol
Lower case S S W
the number zero and lower case R D. What? You taught that And you could either hit enter any keyboard, just click on log in there and may ask you, Do you want to remember? It doesn't matter. They're just go ahead next out. Or you can remember it has no bearing on the lab at all. So you're welcome to do what you want in that particular situation.
What's the next step here? Step 18. We're gonna go ahead and put our mouths over top of the configuration option on the select targets. So this one right here on the set,
all right, so it takes us to our target page here. So now what we're gonna do is we're actually gonna cook this tiny little icon here that looks like a little white star. So it's a small blue colored button, as I mentioned with a white car colored star in the center.
So where to go and click on that? And that's gonna allow us to create a new target so it's actually open a papa box for us when we do that. So go and click on it.
You see here in a second, it opens up this top of box for us.
Well, go ahead and get some of these fields filled out.
All right, So first thing we're gonna do here in step 21 we're gonna go ahead and in the name box type and corporate devices. So stop box here.
Just go ahead and type and corporate devices.
And then in our comment field were type, and these are devices on the network. You don't need the quotation marks. I just wanted you to know that was a basically a statement there. So these air the device, these air devices on the network. So go and type that in the comment box. These are devices on the network.
now what we're gonna do on step 23 under the host. So this this third option down here, we're gonna select the from file option,
and then we're gonna go ahead and browse.
So we went ahead and we selected from file option. We're browsing now.
You'll see. It's open a window in the background there. What? I want you to do now is cook on the student folder.
So it's down here at the bottom left. Go and click on that. And then now you're going to see the file that we created that scanning target list. One.
Go ahead and click on that one.
And it's like the open button.
All right, let's go back to our lab document.
So we've gone ahead and we cook a student folder. We clicked on the file that we had created. We select the open button.
So our last step at this particular screen is gonna be clicking on the crate, but at the very bottom, right? So let's go and do that. Analyses click on that
pulls that little pop up for us.
Let's go back to our lab document.
All right, so our next step here is Step 29. We're gonna go ahead at the very top of the screen here. We're gonna click on. We're gonna cover our mouths over top of the scans option, and there were to select task.
Let's go and do that. Elsa Skins. And then you're gonna see task, right? They're going to go ahead and click on that one
you might get this little pop up here If you see that you connects out of it, or you just wait until that timer runs out. Either way, it'll close it. So I'm just gonna x out of it to save us some time. There a couple of seconds
so you'll see Step 30. That was that little puppet box again. If you just leave it alone for, like, six or seven seconds and it will close for you
the next thing, Where do you where to click back on the small blue collar button again. That's that same one with white star in the center. And we're gonna select new task. So let's go and do that now. So you'll see if I hover my mouse overtop It gives me a new task option. I want to go ahead and click on that.
You'll see it opened up some more fields for us to fill out.
So we're gonna talk in the name field. We're gonna type corporate scans. Let's go and do that now. So this top one here, What's going to happen? Corporate skin.
You remember in the last one we typed in corporate devices. So now what is going to specify that? Hey, this is a corporate scan disassociated with those particular devices.
All right, so all we're gonna do there is actually changed the name. We're just gonna now click the kree button at the bottom, right? So let's go and do that
and what you'll see here in a second as you'll see a line here with our skin and the way we go ahead and start our scan is this little
the white arrow in it? You'll see if I have a mind miles over top the show start and then we're just gonna go ahead and start that
now it's gonna go ahead and run the ER
scan in the background there. Now, it may take 5 to 10 minutes to complete. The next thing I should want you to do wallets going. Going ahead and running is up here at the top or says no auto refresh.
Go ahead and just click in that box and then choose refresh every 30 seconds. So that way, as it starts to complete, you'll start knowing like, okay, it's almost complete and, you know, to be able to come here and click on it
now, as I mentioned, the scan is gonna take about 5 to 10 minutes to complete, so I'm gonna go and Paul's video here once it completes on my end, I'll go ahead and pick back up the video on what you'll notice once it's completed, as we'll see a date here that we can go ahead and click on.
All right, so it's finished scanning. Finally, not mine through a couple of air messages. So that's what kind of took so long to come back on the video. Eso basically, as it was, scanning it would throw on air. If it does that, I forget the exact air code. But just cook the roster back button, and that will take you back to the scanning page.
It eventually should finish successfully.
I'm not like I said. It does take him a moment or so to get finished out, but you eventually should see it finished, and then you'll want to click on. The last state should should be available. Pretty click on
now. If it's not for some reason, just go to scans and the task. Basically, that should try to refresh it, and then you should be good to go. The ultimate goal was to get here
where we have a listing of all the vulnerabilities that it's found. Now, the cool thing about this. And
before that, I want you to answer a question one here. So what vulnerabilities do you see on the report, if any. On my end. Obviously you can see there. I have quite a few vulnerabilities. And then course number two Khanna ties into what I was about to mention one. Other information is provided in the report. Besides just listing out of vulnerability.
What other information is available for us
now on your own? If you want to go in Paul's video, look through all of these items that you find so feel free to look through all of them. Go through different pages, etcetera,
and jot down what information you see. So, for example, here we see, we do have a severity level s 0 10 being the highest 10 out of 10. Not a good thing by any means.
We've also got a the I P address here, as well as the port that we're running on. And then if we open these up so we'll go ahead and click all this click on the stop one here is gonna tell us some information about that particular vulnerability that we're finding. So tell you tell us the CVI codes
if there are any assuming, so there should be
it. Also tell you some other supporting documentation or website since you couldn't go to to find out more about it. And it also just as I mentioned, gives you kind of a brief summary of the particular vulnerability.
All right, so the last step of our lad documents just basically generating a report. And this is something that, like, if you were trying to give it to your boss or one, not this is something that you would want to go ahead and do.
So I'm just gonna back up here, so I'll go back to my main list there. Now, the way we get a report is here in this top of left little dropped out menu, what is gonna click in there? And we're to scroll down and choose pdf
and then this little down arrow right here. That's actually how we generate a report. So the download filtered report is the name of the option. If we go ahead and click on that. It's gonna give us a pop up box here, and then we can either save or open the report. It has not been opening for me in the lab. Here s so I've just been saving. It is kind of a proof of concept thing, but again,
in the real world, you just download this and
open it up and provided to whoever needs it.
But the main thing I wanted to see after we ran open Boston, I'll close it out. The main thing I want to see wanted you to see here is how much information open Voss provides back tow us compared to the core impact. You know, the free scan that we ran earlier. This one's an open source tool. And look at the information, you know, gives us the severity level.
It gives us some my pia information location information
on Then if we click on and give us a description, et cetera of that particular vulnerability
are so in this video, we just wrapped up our discussion on open Voss again. That's ah, vulnerability scanning tool and one that's commonly used in the industry by defenders as well as Attackers
in the next module. We're just gonna go ahead and wrap up our discussion for the entire course. Now, keep in mind as well that there are assessments for this course. Be sure to download the supplement of resource is section. So you'll get all this lab step by step guides as well as all the assessments on. So what I've done there is I've listed out the assessments you need to complete listed out
ah, bunch of different and map commands and I want you to run
of listed at the lab. You should go into two run those as well as an assessment from side F on our site. That's for vulnerability assessments, so to speak, of all in finding vulnerabilities. So I want you to be all of those as part of the kind of the capstone. So to speak of the course and then moving to the Conclusion video where we kind of wrap things up
Penetration Testing and Ethical Hacking
To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
Offensive Penetration Testing
As a pentester, you need to understand the methods of real-life attackers and use the ...
22 CEU/CPE Hours Available
Certificate of Completion Offered