Hi,
We deployed OpenVas in our organization for monitoring vulnerabilities.
After that we checked many targets host to get reports of vulnerabilities.
Further OpenVAS scans produce reports displaying multiple services running
but without vulnerabilities results according to below.

CPE: cpe:/a:openbsd:openssh:7.4
Concluded from remote connection attempt with credentials:
  Login: VulnScan
  Password: VulnScan
</value><source><type>nvt</type><name>1.3.6.1.4.1.25623.
1.0.10267</name><description>Service detection
(1.3.6.1.4.1.25623.1.0.10267)</description></source><extra/>
</detail><detail><name>App</name><value>cpe:/a:openbsd:
openssh:7.4</value><source><type>nvt</type><name>1.3.6.1.
4.1.25623.1.0.10267</name><description>Service detection
(1.3.6.1.4.1.25623.1.0.10267)</description></source><extra/>
</detail><detail><name>cpe:/a:openbsd:openssh:7.4</name><
value>22222/tcp</value><source><type>nvt</type><name>
1.3.6.1.4.1.25623.1.0.10267</name><description>Service detection

So why OpenVAS doesn't scan vulnerabilities?

Environment is
VM Linux kali 4.16.0-kali2-686-pae #1 SMP Debian 4.16.12-1kali1
(2018-05-28) i686 GNU/Linux with selinux disabled;

openvas-check-setup 2.3.7
  Test completeness and readiness of OpenVAS-9

  Please report us any non-detected problems and
  help us to improve this check routine:
  http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss

  Send us the log-file (/tmp/openvas-check-setup.log) to help analyze
the problem.

  Use the parameter --server to skip checks for client tools
  like GSD and OpenVAS-CLI.

Step 1: Checking OpenVAS Scanner ...
        OK: OpenVAS Scanner is present in version 5.1.1.
        OK: redis-server is present in version v=4.0.10.
        OK: scanner (kb_location setting) is configured properly using
the redis-server socket: /var/run/redis-openvas/redis-server.sock
        OK: redis-server is running and listening on socket:
/var/run/redis-openvas/redis-server.sock.
        OK: redis-server configuration is OK and redis-server is running.
        OK: NVT collection in /var/lib/openvas/plugins contains 45687 NVTs.
        OK: Signature checking of NVTs is enabled in OpenVAS Scanner.
        OK: The NVT cache in /var/cache/openvas contains 45687 files
for 45687 NVTs.
Step 2: Checking OpenVAS Manager ...
        OK: OpenVAS Manager is present in version 7.0.2.
        OK: OpenVAS Manager database found in /var/lib/openvas/mgr/tasks.db.
        OK: Access rights for the OpenVAS Manager database are correct.
        OK: sqlite3 found, extended checks of the OpenVAS Manager
installation enabled.
        OK: OpenVAS Manager database is at revision 184.
        OK: OpenVAS Manager expects database at revision 184.
        OK: Database schema is up to date.
        OK: OpenVAS Manager database contains information about 45683 NVTs.
        OK: At least one user exists.
        OK: OpenVAS SCAP database found in /var/lib/openvas/scap-data/scap.db.
        OK: OpenVAS CERT database found in /var/lib/openvas/cert-data/cert.db.
        OK: xsltproc found.
Step 3: Checking user configuration ...
        WARNING: Your password policy is empty.
        SUGGEST: Edit the /etc/openvas/pwpolicy.conf file to set a
password policy.
Step 4: Checking Greenbone Security Assistant (GSA) ...
        OK: Greenbone Security Assistant is present in version 7.0.2.
        OK: Your OpenVAS certificate infrastructure passed validation.
Step 5: Checking OpenVAS CLI ...
        OK: OpenVAS CLI version 1.4.5.
Step 6: Checking Greenbone Security Desktop (GSD) ...
        SKIP: Skipping check for Greenbone Security Desktop.
Step 7: Checking if OpenVAS services are up and running ...
        OK: netstat found, extended checks of the OpenVAS services enabled.
        OK: OpenVAS Scanner is running and listening on a Unix domain socket.
        WARNING: OpenVAS Manager is running and listening only on the
local interface.
        This means that you will not be able to access the OpenVAS
Manager from the
        outside using GSD or OpenVAS CLI.
        SUGGEST: Ensure that OpenVAS Manager listens on all interfaces
unless you want
        a local service only.
        OK: Greenbone Security Assistant is listening on port 443,
which is the default port.
Step 8: Checking nmap installation ...
        WARNING: Your version of nmap is not fully supported: 7.70
        SUGGEST: You should install nmap 5.51 if you plan to use the
nmap NSE NVTs.
Step 10: Checking presence of optional tools ...
        OK: pdflatex found.
        OK: PDF generation successful. The PDF report format is likely to work.
        OK: ssh-keygen found, LSC credential generation for GNU/Linux
targets is likely to work.
        OK: rpm found, LSC credential package generation for RPM based
targets is likely to work.
        OK: alien found, LSC credential package generation for DEB
based targets is likely to work.
        OK: nsis found, LSC credential package generation for
Microsoft Windows targets is likely to work.

It seems like your OpenVAS-9 installation is OK.

If you think it is not OK, please report your observation
and help us to improve this check routine:
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
Please attach the log-file (/tmp/openvas-check-setup.log) to help us
analyze the problem.

Best regards,
Daryn
_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to