Post

openVAS Full Guide Walkthrough

openVAS Full Guide Walkthrough

Title: OpenVAS

Estimated Completion Time: 1-2 hours Skills Required: Basic Linux knowledge, familiarity with web interfaces, and introductory networking concepts.

  • Objectives:
    • Install and configure OpenVAS on a Linux environment (typically Kali Linux).
    • Perform vulnerability scans on target machines.

Introduction

What OpenVAS Is :

A vulnerability scanning application for endpoints and web applications.Part of the Greenbone Vulnerability Management (GVM) solution.

Purpose and Use Cases:

Helps organizations identify security gaps on production or development systems. Supports mitigation efforts by detecting common vulnerabilities that may otherwise be overlooked.

the GVM/OpenVAS Architecture OpenVAS is one component service within the broader Greenbone Vulnerability Management (GVM) framework. GVM is composed of multiple services that together deliver vulnerability scanning and management capabilities. These services can be grouped into three main sections.

image

we can break it down into three distinct sections: Front-End, Back-End, and Vulnerability/Information feed.

  • Vulnerability / Information Feed

    • Provides all vulnerability tests and data used for scanning.
    • Primarily sourced from the Greenbone Community Feed.
      • Includes:
        • NVTs (Network Vulnerability Tests)
        • SCAP and CERT data
        • Optional user-provided data to replace or supplement official feeds.
  • Back-End
    • The core scanning and processing layer of GVM.
    • OpenVAS performs the actual vulnerability scanning.
    • Managed by the Greenbone Vulnerability Manager (GVM), which acts as the intermediary between scanners and user interfaces.
      • handles
        • Processing NVTs
        • Managing targets
        • Coordinating scanners via OSP (Open Scanner Protocol)
  • Front-End
    • The user-facing interface for interacting with the GVM system.
    • Built on the Greenbone Security Assistant (GSA).
    • Provides web-based tools for analysts to configure and manage scans.

Install and configure OpenVAS on a Linux environment.

Kali Linux GVM

This guide shows the fastest and most reliable way to install and run Greenbone Vulnerability Management (GVM) – the current official name of OpenVAS – on Kali Linux (rolling release as of 2025).

Kali already includes GVM in its repositories and often ships it pre-installed but not configured. Just run the setup!

1
2
3
4
5
6
7
8
# 1. Update system
sudo apt update && sudo apt full-upgrade -y

# 2. Install/repair GVM packages
sudo apt install gvm -y

# 3. Run the official setup (creates admin user, downloads feeds, configures services)
sudo gvm-setup

The first run downloads ~2–4 GB of vulnerability feeds. Be patient (10–30 minutes depending on internet speed). At the end you will see:

1
User created with password 'xxxx-xxxx-xxxx-xxxx'.

COPY AND SAVE THIS PASSWORD!

1
2
# 4. Verify everything is correct
sudo gvm-check-setup

Should end with: Your GVM installation is OK.

1
2
# 5. Start GVM and open the web interface
sudo gvm-start

Web interface: https://127.0.0.1:9392
Default login: admin / (the password shown in step 3)
Accept the self-signed certificate.

First Login Tips

Change the admin password immediately (Configuration → Users).
Update feeds (Administration → Feed Status → click “Update”).
Create your first scan target and launch a “Full and Fast” scan.

Performing Your First Vulnerability Scan

Now that GVM is running and you’re logged in as admin, let’s perform a real scan!

Step 1: Create a Target

A Target defines what you want to scan (single IP, range, hostname, etc.).

  1. In the top menu, go to Configuration → Targets
  2. Click the magic wand/star icon (New Target) in the top-left
  3. Fill in the form:

    • Name: TryHackMe Lab → any descriptive name you like
    • Hosts: Enter the IP(s) or hostname(s) to scan
      Examples (use only what you have permission for):
      • Single machine: 10.10.87.142
      • Range: 192.168.1.0/24
      • Multiple IPs: 10.10.50.100, 10.10.50.101
      • Public test host: scanme.nmap.org (explicitly allows scanning)
    • Leave all other settings default for now
  4. Click Save

Critical Reminder: Never scan systems or networks you do not own or have written permission to test. Unauthorized scanning is illegal in most countries.

Step 2: Create a Scan Task

A Task tells GVM how and what to scan.

  1. Go to Scans → Tasks
  2. Click the magic wand/star icon (New Task)
  3. Configure the following:

    FieldRecommended ValueWhy?
    NameFull Scan - Lab NetworkEasy to identify later
    TargetSelect the target you just createdLinks the task to your IPs
    Scan ConfigFull and fastBest balance of speed and coverage (uses smart optimizations)
    ScannerOpenVAS DefaultLeave as is — this is the actual scanning engine
    Scan OrderSequential (default)Fine for most labs
  4. Click Create

Step 3: Launch the Scan

  • On the Tasks page, find your new task
  • Click the green Play buttonStart
  • You’ll be taken to the live status page

Real-time progress appears in:

  • Scans → Dashboard (overall view)
  • Scans → Tasks → click your task name (detailed progress bar)

A small lab machine usually finishes in 5–20 minutes.

Step 4: Understanding the Different Scan Configurations

Config NameDescriptionWhen to Use
Full and fastFastest complete scan — skips tests that would slow it down unnecessarilyDefault choice for 95% of scans
Full and fast ultimateAdds more network-intensive testsWhen you need slightly more coverage
Full and very deepExhaustive — no optimizations, scans every possible port & serviceVery slow, only for critical assets
Full and very deep ultimateMaximum aggressiveness — can trigger IDS/IPSRarely needed outside compliance audits

Recommendation: Always start with Full and fast.

Step 5: Analyzing the Results

When the progress bar hits 100% (green):

  1. Go to Scans → Results
  2. You’ll see a list of all discovered vulnerabilities, sorted by severity:
    • High (red) → Critical issues (often remotely exploitable)
    • Medium (orange)
    • Low (yellow)
    • Log (blue) → informational only
  3. Click any vulnerability to see:
    • CVE ID & CVSS score
    • Affected software/version
    • Detailed description
    • Solution / remediation steps
    • References (Exploit-DB, Metasploit modules, etc.)

Pro tip: Right-click a result → Override → mark as False Positive if you know it’s not applicable.

Step 6: Generate Professional Reports

  1. Go to Scans → Reports
  2. Click the latest report (date/time of your scan)
  3. In the top-right corner, click the Download arrow
  4. Choose your preferred format:

    FormatBest For
    PDFManagement, audits, compliance
    HTMLInteractive viewing in browser
    CSVImport into Excel or ticketing
    XMLAutomated processing / SIEM
TargetIP / HostnameNotes
scanme.nmap.orgscanme.nmap.orgOfficially allows Nmap/OpenVAS scanning
TryHackMe deployed VMsYour machine IPPerfect for labs
Metasploitable 2/3Your VM IPWill find 100–500+ vulnerabilities
Vulnerable labs (e.g., VulnHub)Local/virtual IPsAlways stay within your own network

Top Alternatives to OpenVAS/GVM

ToolTypeLicenseBest ForKey AdvantagesDrawbacks vs OpenVASLatest Stable Version (Dec 2025)
Nessus ProfessionalCommercialProprietarySmall–medium businesses, consultantsExtremely accurate, beautiful UI, great supportExpensive (~$3k–$10k/year)Nessus 10.7+
Tenable.io / Tenable.epCloud + On-premProprietaryEnterprises, large-scale environmentsUnlimited scanning, asset management, predictive prioritizationVery expensive, vendor lock-inContinuously updated
Qualys VMDRCloudProprietaryGlobal enterprises, compliance-heavy orgsZero infrastructure, excellent asset taggingHigh cost, requires internetCloud Platform 2025.x
Nexpose / InsightVM (Rapid7)On-prem + CloudProprietaryMid-to-large enterprisesReal-risk scoring, Metasploit integrationPricey, heavier resource usageInsightVM 6.6+
Burp Suite Pro (Scanner)Web-focusedProprietaryWeb application security testingBest-in-class web vulnerability scannerNot a network scannerBurp Suite 2025.11+
NucleiOpen SourceMITFast, modern, CTF & red-team scanningYAML-based templates, blazing fast, community-drivenRequires manual target & template managementv3.2.9+
RustScan + Nuclei comboOpen SourceGPL/MITSpeed demons & bug bounty huntersFinds open ports in <3 sec + custom scansLess polished reportingRustScan 2.3 + Nuclei 3.x
ZAP (OWASP Zed Attack Proxy)Open SourceApache 2.0Web app scanning (free alternative to Burp)Active & passive scanning, CI/CD integrationOnly web, not networkZAP 2.15+
FaradayOpen Source + PaidGPL + CommercialCollaborative pentest & vuln managementIntegrates results from OpenVAS, Nessus, Nmap, etc.More of a platform than a scannerFaraday v5.x
WapitiOpen SourceGPLv2Lightweight black-box web scannerSimple CLI, good for quick web checksFewer features than Burp/ZAPWapiti 3.1+
VulsOpen SourceGPLAgentless Linux/server vulnerability scanningNo agent needed, great for Linux fleetsFocused on OS/packages onlyVuls v0.25+
TrivyOpen SourceApache 2.0Container, IaC, and OS vulnerability scanningExtremely fast, perfect for DevSecOpsNot a traditional network scannerTrivy 0.56+

Quick Decision Matrix (What Should You Choose?)

Your SituationRecommended Alternative
You want free + unlimited scanningNuclei or RustScan + Nuclei
You need enterprise features & budgetTenable.io or Qualys VMDR
You already pay for Nessus (common in consulting)Stick with Nessus Professional
You only scan web applicationsBurp Suite Pro or OWASP ZAP (free)
You love OpenVAS but want something faster/lightweightNuclei (modern replacement)
You manage Linux servers/containers onlyTrivy or Vuls
You want a central platform for all toolsFaraday (imports OpenVAS reports too)

Bottom line in 2025:
OpenVAS/GVM is still one of the best fully free network vulnerability scanners, but Nuclei has become the de-facto open-source successor for speed and modern workflows.

You’re now fully equipped to run professional-grade vulnerability scans with OpenVAS/GVM!

Happy (and responsible) hacking!

This post is licensed under CC BY 4.0 by the author.