Advanced vulnerability scanning with OpenVAS
Vulnerability identification through unauthenticated network scanning is a good way to start gathering intelligence on a network, but a powerful component of this is the ability to perform more frequent, targeted scans, and this can include credentials that allow for the successful authentication to a target system for deeper level evaluations.
Features that make OpenVAS more powerful include highly configurable scan configurations, scheduled tasks, automated reporting, and alerting.
Aside from the default scan configurations that are present in the OpenVAS dashboard, it also contains some very flexible options, including scheduled scans and customized scan types. We will be looking at customized scan configurations.
Getting ready
In order to complete this section, you will need the following:
- OpenVAS successfully installed and configured on your Kali Linux system
- Access to the Kali system, either from the desktop or a browser
- Network access to the systems...