Sent from my iPhone

> On Jun 25, 2018, at 10:01 PM, Daryn Utesbayev <dutesba...@gmail.com> wrote:
> 
> Hi, 
> We deployed OpenVas in our organization for monitoring vulnerabilities. After 
> that we checked many targets host to get reports of vulnerabilities. Further 
> OpenVAS scans produce reports displaying multiple services running but 
> without vulnerabilities results according to below. 

Are you doing authenticated scans?

> 
> CPE: cpe:/a:openbsd:openssh:7.4
> Concluded from remote connection attempt with credentials:
>   Login: VulnScan
>   Password: VulnScan
> </value><source><type>nvt</type><name>1.3.6.1.4.1.25623.1.0.10267</name><description>Service
>  detection 
> (1.3.6.1.4.1.25623.1.0.10267)</description></source><extra/></detail><detail><name>App</name><value>cpe:/a:openbsd:openssh:7.4</value><source><type>nvt</type><name>1.3.6.1.4.1.25623.1.0.10267</name><description>Service
>  detection 
> (1.3.6.1.4.1.25623.1.0.10267)</description></source><extra/></detail><detail><name>cpe:/a:openbsd:openssh:7.4</name><value>22222/tcp</value><source><type>nvt</type><name>1.3.6.1.4.1.25623.1.0.10267</name><description>Service
>  detection 
> 
> So why OpenVAS doesn't scan vulnerabilities?
> 
> Environment is
> VM Linux kali 4.16.0-kali2-686-pae #1 SMP Debian 4.16.12-1kali1 (2018-05-28) 
> i686 GNU/Linux with selinux disabled;
> openvas-check-setup 2.3.7
>   Test completeness and readiness of OpenVAS-9
> 
>   Please report us any non-detected problems and
>   help us to improve this check routine:
>   http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
> 
>   Send us the log-file (/tmp/openvas-check-setup.log) to help analyze the 
> problem.
> 
>   Use the parameter --server to skip checks for client tools
>   like GSD and OpenVAS-CLI.
> 
> Step 1: Checking OpenVAS Scanner ...
>         OK: OpenVAS Scanner is present in version 5.1.1.
>         OK: redis-server is present in version v=4.0.10.
>         OK: scanner (kb_location setting) is configured properly using the 
> redis-server socket: /var/run/redis-openvas/redis-server.sock
>         OK: redis-server is running and listening on socket: 
> /var/run/redis-openvas/redis-server.sock.
>         OK: redis-server configuration is OK and redis-server is running.
>         OK: NVT collection in /var/lib/openvas/plugins contains 45687 NVTs.
>         OK: Signature checking of NVTs is enabled in OpenVAS Scanner.
>         OK: The NVT cache in /var/cache/openvas contains 45687 files for 
> 45687 NVTs.
> Step 2: Checking OpenVAS Manager ...
>         OK: OpenVAS Manager is present in version 7.0.2.
>         OK: OpenVAS Manager database found in /var/lib/openvas/mgr/tasks.db.
>         OK: Access rights for the OpenVAS Manager database are correct.
>         OK: sqlite3 found, extended checks of the OpenVAS Manager 
> installation enabled.
>         OK: OpenVAS Manager database is at revision 184.
>         OK: OpenVAS Manager expects database at revision 184.
>         OK: Database schema is up to date.
>         OK: OpenVAS Manager database contains information about 45683 NVTs.
>         OK: At least one user exists.
>         OK: OpenVAS SCAP database found in /var/lib/openvas/scap-data/scap.db.
>         OK: OpenVAS CERT database found in /var/lib/openvas/cert-data/cert.db.
>         OK: xsltproc found.
> Step 3: Checking user configuration ...
>         WARNING: Your password policy is empty.
>         SUGGEST: Edit the /etc/openvas/pwpolicy.conf file to set a password 
> policy.
> Step 4: Checking Greenbone Security Assistant (GSA) ...
>         OK: Greenbone Security Assistant is present in version 7.0.2.
>         OK: Your OpenVAS certificate infrastructure passed validation.
> Step 5: Checking OpenVAS CLI ...
>         OK: OpenVAS CLI version 1.4.5.
> Step 6: Checking Greenbone Security Desktop (GSD) ...
>         SKIP: Skipping check for Greenbone Security Desktop.
> Step 7: Checking if OpenVAS services are up and running ...
>         OK: netstat found, extended checks of the OpenVAS services enabled.
>         OK: OpenVAS Scanner is running and listening on a Unix domain socket.
>         WARNING: OpenVAS Manager is running and listening only on the local 
> interface.
>         This means that you will not be able to access the OpenVAS Manager 
> from the
>         outside using GSD or OpenVAS CLI.
>         SUGGEST: Ensure that OpenVAS Manager listens on all interfaces unless 
> you want
>         a local service only.
>         OK: Greenbone Security Assistant is listening on port 443, which is 
> the default port.
> Step 8: Checking nmap installation ...
>         WARNING: Your version of nmap is not fully supported: 7.70
>         SUGGEST: You should install nmap 5.51 if you plan to use the nmap NSE 
> NVTs.
> Step 10: Checking presence of optional tools ...
>         OK: pdflatex found.
>         OK: PDF generation successful. The PDF report format is likely to 
> work.
>         OK: ssh-keygen found, LSC credential generation for GNU/Linux targets 
> is likely to work.
>         OK: rpm found, LSC credential package generation for RPM based 
> targets is likely to work.
>         OK: alien found, LSC credential package generation for DEB based 
> targets is likely to work.
>         OK: nsis found, LSC credential package generation for Microsoft 
> Windows targets is likely to work.
> 
> It seems like your OpenVAS-9 installation is OK.
> 
> If you think it is not OK, please report your observation
> and help us to improve this check routine:
> http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
> Please attach the log-file (/tmp/openvas-check-setup.log) to help us analyze 
> the problem.
> 
> Best regards,
> Daryn
> 
> _______________________________________________
> Openvas-discuss mailing list
> Openvas-discuss@wald.intevation.org
> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to