Vulnerability Assessment
Group 5
Igibek Koishybayev;Yingchao Zhu
ChenQian; XingyuWu; XuZhuo Zhang
The Open Vulnerability Assessment System (OpenVAS)
is a framework of several services and tools offering a
comprehensive and powerful vulnerability scanning and
vulnerability management solution.
Founded 1999, Osnabrück, Germany
Why Vulnerability Assessment?
Unnecessary open shares
 Unused user accounts
 Unnecessary open ports
 Rogue devices connected to your systems
 Dangerous script configurations
 Servers allowing use of dangerous protocols
 Incorrect permissions on important system files
 Running of unnecessary, potentially dangerous services
Core: Network Vulnerability Tests (NVTs), the security scanner
accompanied with a daily updated feed
OpenVAS Elements:
OpenVAS Software (Server, Client,VulerabilityTests): GNU General Public
OpenVAS Management tools
NVT(Network Vulnerability Tests) Feed service: daily updated tests,
unrestricted access
Feature overview
OpenVAS Scanner
 Many target hosts are scanned concurrently
 OpenVAS Transfer Protocol (OTP)
 SSL support for OTP (always)
 WMI support (optional)
OpenVAS Manager
 OpenVAS Management Protocol (OMP)
 SQL Database (sqlite) for configurations and scan
 SSL support for OMP (always)
 Many concurrent scans tasks (many OpenVAS
 Notes management for scan results
 False Positive management for scan results
 Scheduled scans
 Master-Slave Mode to control many instances from a
central one
 Reports Format Plugin Framework with various
plugins for: XML, HTML, LateX, etc.
Greenbone Security Assistant (GSA)
Client for OMP and OAP
Web server on its own (microhttpd), thus no extra web
server required
Integrated online-help system
Multi-language support
Client for OMP
Runs on Windows, Linux, etc.
Plugin for Nagios
Sample Test Report
Lab Generation
1. Setting up and Pre-work
Get familiar with the OpenVAS software/Backtrack/CentOS
 Learn some successful examples using OpenVAS in the past.
 Learn some leak patterns.
 Set up the environment for the test
Lab Generation
2. Find targets
• Create our own mailbox application
• Use the real mailbox application with open source
--Protocol: SMTP(send)/IMAP(receive)/POP3(receive)
Lab Generation
2. Find targets
• Open Source Web Browser (EX: The Chromium
• Server with some vulnerabilities (EX: old version CGI)
Lab Generation
3. Penetration Test/Problem solve
• Using OpenVAS to do the test, find some
vulnerabilities of the software/web browser/server
• Attack the software/web browser/server
• Try to fix the vulnerability
Lab Generation
4. Re-test
• Retest using OpenVAS after leaks fixing
• Attack again to check if the vulnerabilities are solved
Lab Generation
5. Report
• Give a detailed idea of these assessment
• Give a tutorial of how to use the OpenVAS for the
Extra Points (if time permitted)
• Develop the mobile platform application to do the
whole process above
Thank you
Happy Hacking!

similar documents