Video - Scanning for Vulnerabilities Using OpenVAS

Ethical Hacking - A Hands-On Approach to Ethical Hacking Scanning for Vulnerabilities Using OpenVAS
10 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$99.99
List Price:  $139.99
You save:  $40
€93.59
List Price:  €131.03
You save:  €37.43
£80.45
List Price:  £112.64
You save:  £32.18
CA$136.81
List Price:  CA$191.54
You save:  CA$54.73
A$153.85
List Price:  A$215.39
You save:  A$61.54
S$136.10
List Price:  S$190.55
You save:  S$54.44
HK$783.19
List Price:  HK$1,096.50
You save:  HK$313.30
CHF 91.41
List Price:  CHF 127.98
You save:  CHF 36.57
NOK kr1,095.33
List Price:  NOK kr1,533.51
You save:  NOK kr438.17
DKK kr697.93
List Price:  DKK kr977.13
You save:  DKK kr279.20
NZ$168.49
List Price:  NZ$235.89
You save:  NZ$67.40
د.إ367.25
List Price:  د.إ514.16
You save:  د.إ146.91
৳10,960.96
List Price:  ৳15,345.79
You save:  ৳4,384.82
₹8,331.14
List Price:  ₹11,663.93
You save:  ₹3,332.78
RM477.70
List Price:  RM668.80
You save:  RM191.10
₦126,037.39
List Price:  ₦176,457.39
You save:  ₦50,420
₨27,728.08
List Price:  ₨38,820.43
You save:  ₨11,092.34
฿3,701.79
List Price:  ฿5,182.66
You save:  ฿1,480.86
₺3,251.67
List Price:  ₺4,552.47
You save:  ₺1,300.80
B$513.17
List Price:  B$718.47
You save:  B$205.29
R1,913.51
List Price:  R2,678.99
You save:  R765.48
Лв183.04
List Price:  Лв256.26
You save:  Лв73.22
₩137,500.16
List Price:  ₩192,505.72
You save:  ₩55,005.56
₪376.08
List Price:  ₪526.53
You save:  ₪150.44
₱5,758.67
List Price:  ₱8,062.37
You save:  ₱2,303.69
¥15,492.10
List Price:  ¥21,689.56
You save:  ¥6,197.46
MX$1,697.24
List Price:  MX$2,376.20
You save:  MX$678.96
QR362.79
List Price:  QR507.92
You save:  QR145.13
P1,387.12
List Price:  P1,942.02
You save:  P554.90
KSh13,448.65
List Price:  KSh18,828.65
You save:  KSh5,380
E£4,787.02
List Price:  E£6,702.02
You save:  E£1,915
ብር5,664.26
List Price:  ብር7,930.19
You save:  ብር2,265.93
Kz83,485.81
List Price:  Kz116,883.48
You save:  Kz33,397.66
CLP$95,360.46
List Price:  CLP$133,508.46
You save:  CLP$38,148
CN¥724.53
List Price:  CN¥1,014.38
You save:  CN¥289.84
RD$5,902.47
List Price:  RD$8,263.69
You save:  RD$2,361.22
DA13,439.62
List Price:  DA18,816
You save:  DA5,376.38
FJ$229.29
List Price:  FJ$321.01
You save:  FJ$91.72
Q776.47
List Price:  Q1,087.09
You save:  Q310.61
GY$20,894.43
List Price:  GY$29,253.04
You save:  GY$8,358.61
ISK kr14,065.59
List Price:  ISK kr19,692.39
You save:  ISK kr5,626.80
DH1,009.26
List Price:  DH1,413.01
You save:  DH403.74
L1,779.82
List Price:  L2,491.82
You save:  L712
ден5,758.50
List Price:  ден8,062.13
You save:  ден2,303.63
MOP$806.12
List Price:  MOP$1,128.60
You save:  MOP$322.48
N$1,913.23
List Price:  N$2,678.60
You save:  N$765.36
C$3,661.78
List Price:  C$5,126.64
You save:  C$1,464.86
रु13,321.12
List Price:  रु18,650.11
You save:  रु5,328.98
S/368.06
List Price:  S/515.29
You save:  S/147.23
K378.12
List Price:  K529.39
You save:  K151.26
SAR375.03
List Price:  SAR525.05
You save:  SAR150.02
ZK2,574.10
List Price:  ZK3,603.84
You save:  ZK1,029.74
L465.65
List Price:  L651.93
You save:  L186.28
Kč2,362.20
List Price:  Kč3,307.17
You save:  Kč944.97
Ft36,810.41
List Price:  Ft51,536.04
You save:  Ft14,725.63
SEK kr1,086.49
List Price:  SEK kr1,521.13
You save:  SEK kr434.64
ARS$87,266.68
List Price:  ARS$122,176.84
You save:  ARS$34,910.16
Bs687.45
List Price:  Bs962.46
You save:  Bs275.01
COP$390,268.69
List Price:  COP$546,391.78
You save:  COP$156,123.08
₡50,117.34
List Price:  ₡70,166.29
You save:  ₡20,048.94
L2,455.43
List Price:  L3,437.70
You save:  L982.27
₲738,156.27
List Price:  ₲1,033,448.32
You save:  ₲295,292.04
$U3,836.09
List Price:  $U5,370.68
You save:  $U1,534.59
zł404.46
List Price:  zł566.27
You save:  zł161.80
Already have an account? Log In

Transcript

Greetings and a new short video presentation, we're going to see how we go about conducting a vulnerability scan of our network using open bass. So there's a couple things we have to do to get ready here. One of those is make sure that our machine is configured for bridge networking. So I'm going to go up to a machine, go into settings, look at my network and make sure that I have a bridged adapter. That's if you want to scan your entire home network. If you're not worried about it, then don't change it from that to bridge, just leave it alone.

Next thing we have to do is find out our network IP for this network. Now I'm currently sitting on 192 dot 168 dot zero and that is my network IP, the dot 30 that just represents the IP address assigned to my Kali machine. Alright, so now we can go ahead and get started. So the next thing we want to do is go ahead and open up a browser and we're going to go on over to our open vast you Use your interface, which is actually a web page. And to get up in here, I'm going to type in HTTPS, colon forward slash forward slash 192 dot 168 dot zero.oh. I'm sorry, I can do that.

But let's do it like this. I'm gonna type in four slash four slash, I'm gonna use my loopback 127, that zero dot zero dot one. And you'll notice that it says the connection is not secure. That's normal, because it can't verify the certificate. So it doesn't know who actually created the certificate and it doesn't care. It just says that the connection is not secured.

So we're going to make an exception. To do this, we're going to click on the Advanced tab. And then we're going to go down here and we're going to click on where it says add exception. On this next page, we're going to confirm the security exception and now we have have our log on page for open bass. Now the username and the password is in the lab. But I will tell you that for this container when you use a container to install Open bass, the username and password is admin.

So I've typed in that username and password admin and admin, I'm going to log in, you can tell it to remember if you like if you're going to use this quite a bit. And that brings us up to the dashboard. So I'm going to show you how to conduct a scan real quick of your network. And we begin by just going over here to scans and we're going to go and create a new task. And then it tells us that we can go ahead and use the task wizard. So we're gonna go ahead and close this out.

And we're going to head on over here to the task wizard. And it's going to take us through the process of actually creating a task to scan our network. So I'm going to go ahead and get rid of that 172 I'm going to type in 192 dot 168 dot zero That zero slash 24. So again, I'm telling it, that everything is filled up all the way through the first three octets. The only octet I want you to worry about is that last eight bits, which is the dot zero on the end. And I want you to find all the IP addresses that are assigned to devices on this network and scan them.

So let's go ahead and start a scan, just go ahead and click the Start Scan button. So the task has been requested, and it's going to take a little while for it to create it. Once the task is created, that this is going to change the status. Once the status changes, then we'll actually start scanning. And when it does, we can go over to the actual results in real time, and watch those scans come in. So you've just seen the status change to a percentage.

Now this means that we can go ahead and go on over and we can see the scan results as you're coming in. But right now There's nothing there. So we're gonna go ahead and be patient. And we're going to wait for it to scan my network and then come back and tell me what devices have certain vulnerabilities. Now be patient with this scan the page for these, this dashboard is going to refresh automatically every so many seconds to let you know what changes are actually happening with your status. So if you don't see it changing, it's because it can take a while for it to get any good results.

Remember, now it's scanning for 254 IP addresses. Your IP address may be somewhere in there, but it's gonna take a while for it to get. Additionally, in our last video, you saw how we updated open bass and we updated a lot of those network vulnerability test scripts a lot. So all that is being looked at for every IP address that is alive on the network. So that can take a little while to go through. So my scan is now up to 61%.

It doesn't look like there's a lot going on in here, but we'll go ahead and click it and see what's going on with our report. So we're going to get on over here to the actual status page. And you'll see that I've got some mediums, nets, my DC RPC service. And there's also some lows, some TCP timestamps. That's not a big deal. This severity here, we can take a look at that real quick.

If we click on this. It's more information about this particular vulnerability, and we can see exactly what it is. Now the good thing about these reports is that if you are lucky enough, you may get an idea of how to how to solve it or how to fix it. So the solution mitigation filter incoming traffic to this port is the answer. That's what it says. But we have a port 49 157155 and some other ports here that it's saying.

Vulnerability detection results for this particular service, this ms RPC service running on this host via the TCP protocol. So it says that I'm vulnerable to an attack with these particular ports available. So you can either use your browser back button, or you can just go to scan and go to task. Either one will take you back to the homepage there. And if you want to see what's going on here with your scan, you'll see that we're looking at approximately 66% of it being completed. You have your host IP addresses over here.

And you can click on these and let's see what happens. Get a report for this machine. And we do. So let's see not a lot going on here but the scan hasn't completed yet. So all the information won't be available to us until we get a complete scan. Again, I can go up here to scans I can click on task is taking back over, and I can look at the scan results as they come in.

So my scan has completed and I now have a status have done and I also have a report and over here you can see that I have one medium reported a lot of information and no severities no high severity found. Now to look at the actual results. I want to see the report to see the report I go over here in our neath where it says report, I just click on the number. That's going to take me over to the next page just a moment. There we go. Now you'll see that we have this one medium over here and we have listed over here as well.

So we can look at the scan results for the entire scan by clicking on the task. And you'll see that it comes up and it tells you everything you want to know about this particular scan, such as how long it took 16 minutes, 29 seconds, it found 51 results, any notes that you might want to add, you could override if there were any. And now we can return back on over to our previous page. As far as scans go, we're not having much luck here finding some good vulnerabilities to be able to attack or exploit. But that can be a good thing. And that can be a bad thing depending on which hat you're wearing.

Again, we're looking at the results of this scan and it's it's pretty complete. For the scan results. We can go over here and click on the medium to see what this pops up. Not a lot, not a lot of information here we've got just this graph to look at That's about it. Now we have the IP addresses. And we're looking at those machines, and in particular the type of severity.

On this page here, we can look at the IP addresses of the machines that were scanned, and the severity of the vulnerabilities that were found. And again, if you'd like to have some more information about each one of these vulnerabilities that were discovered, just click on the vulnerability itself. And you'll get you'll take it on over to the next page where you'll find out all about it. Well, as you can see, open vast is pretty intuitive. You could spend five or 10 minutes with it, and you'd know all about it. There's not a lot that's going on in here we have one scan as opposed to 50 different scans that nessus offers us, but it's a good scanner.

It does a good job. And the best part about it is it's open source and it's free. Okay, that concludes this short video presentation on how we go about conducting a vulnerability scan. of our network using open vast and if you have any concerns or any questions about the content of this video or the lab don't hesitate to reach out and contact your instructor and I'll see you in my next video.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.