InfoSecLabs
  • Information Security Labs
  • Cryptography
    • Introduction to OpenSSL/LibreSSL
    • Symmetric cryptography
    • Asymmetric cryptography
    • Hashes and Message Authentication Codes
    • Elliptic Curve Cryptography
    • Diffie-Hellman (DH)
    • Digital Signatures
    • Digital Certificates
    • S/MIME
    • OCSP - Online Certificate Status Protocol
    • SSL/TLS
  • Passwords
    • Understanding and attacking password-based systems
    • THC-Hydra
    • John the Ripper
    • Hashcat
  • Vulnerability Testing
    • Introduction to vulnerability testing
    • Reconnaissance and Footprinting
      • OSINT
      • Maltego
      • Recon-ng
      • theHarvester
      • dmitry
    • Scanning and Enumeration
      • Nmap
      • Hping3
    • Vulnerability Identification and Analysis
      • OpenVAS
        • OpenVAS Architecture
        • Installing OpenVAS on Kali Linux
        • Starting and Stopping OpenVAS
        • Navigating through OpenVAS
        • Scanning a target
      • Nessus
  • Vulnerability Exploitation
    • About the Metasploit Framework
    • Basics of Metasploit Framework
    • Exploitation with Metasploit Framework
      • vsftp Backdoor Vulnerability [CVE-2011-2523]
      • UnrealIRCd backdoor [CVE-2010-2075]
      • distCC RCE [CVE-2004-2687]
      • Java RMI Server Insecure Default Configuration RCE Vulnerability
      • VNC Brute Force Login
      • MySQL / MariaDB Default Credentials (MySQL Protocol)
      • SAMBA (Samba “username map script” Command Execution)
      • Tomcat (Apache Tomcat Manager Application Deployer Authenticated Code Execution)
      • Apache (CGI Argument Injection)
      • Windows Eternalblue [CVE-2017-143,144,145,146,148]
    • Create payload to exploit users
  • Application Security
    • DVWA - Damn Vulnerable Web Application
      • Introduction
      • Setup
      • Web Apps Vulnerability Testing
        • Brute-Force
        • Command Injection
        • File inclusion
        • File upload
        • SQL Injection
        • SQL Injection (Blind)
        • XSS (Reflected)
        • XSS (Stored)
  • Social Engineering
Powered by GitBook
On this page
  1. Vulnerability Testing
  2. Vulnerability Identification and Analysis
  3. OpenVAS

OpenVAS Architecture

PreviousOpenVASNextInstalling OpenVAS on Kali Linux

Last updated 1 year ago

The architecture of OpenVAS is based on a client-server model, where the OpenVAS scanner acts as the server, and the OpenVAS client is used to communicate with the server to perform vulnerability scans.

The OpenVAS architecture consists of the following components:

  1. OpenVAS Scanner: This component is responsible for performing the actual vulnerability scans on the target system. It includes various plugins that are used to identify known vulnerabilities in the system.

  2. OpenVAS Manager: This component is responsible for managing the OpenVAS Scanner, creating and scheduling scans, and storing scan results. The OpenVAS Manager also communicates with the OpenVAS client to provide scan results and other information.

  3. OpenVAS CLI: This is a command-line interface that allows users to interact with the OpenVAS Manager and Scanner.

  4. OpenVAS Greenbone Security Assistant (GSA): This is a web-based interface that provides a graphical user interface for managing and configuring the OpenVAS Scanner and Manager. It also allows users to view and manage scan results.

  5. OpenVAS Libraries: These are a set of libraries that provide various functions and APIs to interact with the OpenVAS Scanner and Manager.

Overall, the OpenVAS architecture is designed to be modular and extensible, allowing users to customize and configure the scanner to meet their specific needs.

OpenVAS uses Network Vulnerability Tests (NVTs) to identify vulnerabilities in target systems during a vulnerability scan.

NVTs are essentially scripts or plugins that are used by OpenVAS to perform specific tests or checks against a target system. These tests can range from simple checks such as banner grabbing to complex tests such as exploiting vulnerabilities in the target system.

Each NVT is designed to detect a specific vulnerability or weakness in a target system. NVTs are constantly updated to keep up with the latest vulnerabilities and exploits.

OpenVAS includes a large number of NVTs, covering a wide range of platforms and technologies. The NVTs can be configured to perform different types of scans, including authenticated and unauthenticated scans, and can be customized to meet the specific needs of the user.

When OpenVAS performs a scan, it selects the appropriate NVTs based on the target system and the scan configuration. The NVTs are executed by the OpenVAS scanner, and the results are then reported to the user. The user can then take appropriate action to fix the vulnerabilities that were identified by the NVTs.