关于OpenAVS的概念,我这里不多赘述。
前提得,大家要先安装好OpenVAS!!!
我们都知道,BT5中已经预先安装好了OpenVAS网络漏洞扫描工具,我们只需进行一些配置即可。
具体,请见我下面的这篇博客。
BackTrack5里使用OpenVAS
本博文,是在kali 2.0 linux里,使用OpenVAS,所以大家需要去看我下面的这篇博客。(若你没有安装的话)
Kali 2.0 linux里安装OpenVAS
Kali linux2.0里Metasploit的OpenVAS
一、首先要载入OpenVAS插件
root@kali:~# msfconsole msf > load openvas [*] Welcome to OpenVAS integration by kost and averagesecurityguy. [*] [*] OpenVAS integration requires a database connection. Once the [*] database is ready, connect to the OpenVAS server using openvas_connect. [*] For additional commands use openvas_help. [*] [*] Successfully loaded plugin: OpenVAS msf >
二、连接上OpenVAS
msf > openvas_connect
[*] Usage:
[*] openvas_connect username password host port <ssl-confirm>
msf > openvas_connect admin admin 10.0.0.1 9390 ok
三、设置扫描目标,这里假设10.0.0.1
msf > openvas_target_create router 10.0.0.1 msf
四、选择扫描策略
msf > openvas_config_list
[+] OpenVAS list of configs
ID Name
-- ----
0 Full and fast
1 Full and fast ultimate
2 Full and very deep
3 Full and very deep ultimate
4 empty
五、建立扫描任务并选择相应扫描策略
msf > openvas_task_create
[*] Usage: openvas_task_create <name> <comment> <config_id> <target_id>
msf > openvas_task_create router "router commnent scan" 0 2
六、执行扫描任务
msf > openvas_task_start
[*] Usage: openvas_task_start <id>
msf > openvas_task_start 2
七、查看任务进度
msf > openvas_task_list
msf > openvas_task_list
[+] OpenVAS list of tasks
ID Name Comment Status Progress
-- ---- ------- ------ --------
0 unnamed Done -1
1 router router commnent scan Requested 1
八、下载扫描报告
msf > openvas_report_list //找到需要下载的扫描报告ID
msf > openvas_format_list//列出可供下载的扫描报告格式
msf > openvas_report_download
[*] Usage: openvas_report_download <report_id> <format_id> <path> <report_name>
msf > openvas_report_download 2 1 /root router_scan_report.html
如果你不习惯使用命令行下建立扫描任务,当然你可以配置在浏览器里面打开,建立扫描。
本文转自大数据躺过的坑博客园博客,原文链接:http://www.cnblogs.com/zlslch/p/6872613.html,如需转载请自行联系原作者