Kali linux 2016.2(Rolling)里Metasploit的OpenVAS
2017-05-18 11:53
411 查看
不多说,直接上干货!
关于OpenAVS的概念,我这里不多赘述。
[b] 前提得,大家要先安装好OpenVAS[/b]!!!
我们都知道,BT5中已经预先安装好了OpenVAS网络漏洞扫描工具,我们只需进行一些配置即可。
具体,请见我下面的这篇博客。
一、首先要载入OpenVAS插件
二、连接上OpenVAS
msf > openvas_connect
[*] Usage:
[*] openvas_connect username password host port <ssl-confirm>
msf > openvas_connect admin admin 10.0.0.1 9390 ok
三、设置扫描目标,这里假设10.0.0.1
msf > openvas_target_create router 10.0.0.1 msf
四、选择扫描策略
msf > openvas_config_list
[+] OpenVAS list of configs
ID Name
-- ----
0 Full and fast
1 Full and fast ultimate
2 Full and very deep
3 Full and very deep ultimate
4 empty
五、建立扫描任务并选择相应扫描策略
msf > openvas_task_create
[*] Usage: openvas_task_create <name> <comment> <config_id> <target_id>
msf > openvas_task_create router "router commnent scan" 0 2
六、执行扫描任务
msf > openvas_task_start
[*] Usage: openvas_task_start <id>
msf > openvas_task_start 2
七、查看任务进度
msf > openvas_task_list
msf > openvas_task_list
[+] OpenVAS list of tasks
ID Name Comment Status Progress
-- ---- ------- ------ --------
0 unnamed Done -1
1 router router commnent scan Requested 1
八、下载扫描报告
msf > openvas_report_list //找到需要下载的扫描报告ID
msf > openvas_format_list//列出可供下载的扫描报告格式
msf > openvas_report_download
[*] Usage: openvas_report_download <report_id> <format_id> <path> <report_name>
msf > openvas_report_download 2 1 /root router_scan_report.html
如果你不习惯使用命令行下建立扫描任务,当然你可以配置在浏览器里面打开,建立扫描。
http://pwd1999.blog.51cto.com/2934152/1546849
关于OpenAVS的概念,我这里不多赘述。
[b] 前提得,大家要先安装好OpenVAS[/b]!!!
我们都知道,BT5中已经预先安装好了OpenVAS网络漏洞扫描工具,我们只需进行一些配置即可。
具体,请见我下面的这篇博客。
BackTrack5里使用OpenVAS
本博文,是在kali 2.0 linux里,使用OpenVAS,所以大家需要去看我下面的这篇博客。(若你没有安装的话)
Kali 2.0 linux里安装OpenVAS
[b] Kali linux2.0里Metasploit的OpenVAS[/b]一、首先要载入OpenVAS插件
root@kali:~# msfconsole msf > load openvas [*] Welcome to OpenVAS integration by kost and averagesecurityguy. [*] [*] OpenVAS integration requires a database connection. Once the [*] database is ready, connect to the OpenVAS server using openvas_connect. [*] For additional commands use openvas_help. [*] [*] Successfully loaded plugin: OpenVAS msf >
二、连接上OpenVAS
msf > openvas_connect
[*] Usage:
[*] openvas_connect username password host port <ssl-confirm>
msf > openvas_connect admin admin 10.0.0.1 9390 ok
三、设置扫描目标,这里假设10.0.0.1
msf > openvas_target_create router 10.0.0.1 msf
四、选择扫描策略
msf > openvas_config_list
[+] OpenVAS list of configs
ID Name
-- ----
0 Full and fast
1 Full and fast ultimate
2 Full and very deep
3 Full and very deep ultimate
4 empty
五、建立扫描任务并选择相应扫描策略
msf > openvas_task_create
[*] Usage: openvas_task_create <name> <comment> <config_id> <target_id>
msf > openvas_task_create router "router commnent scan" 0 2
六、执行扫描任务
msf > openvas_task_start
[*] Usage: openvas_task_start <id>
msf > openvas_task_start 2
七、查看任务进度
msf > openvas_task_list
msf > openvas_task_list
[+] OpenVAS list of tasks
ID Name Comment Status Progress
-- ---- ------- ------ --------
0 unnamed Done -1
1 router router commnent scan Requested 1
八、下载扫描报告
msf > openvas_report_list //找到需要下载的扫描报告ID
msf > openvas_format_list//列出可供下载的扫描报告格式
msf > openvas_report_download
[*] Usage: openvas_report_download <report_id> <format_id> <path> <report_name>
msf > openvas_report_download 2 1 /root router_scan_report.html
如果你不习惯使用命令行下建立扫描任务,当然你可以配置在浏览器里面打开,建立扫描。
http://pwd1999.blog.51cto.com/2934152/1546849
相关文章推荐
- Kali linux 2016.2(Rolling)中metasploit的主机探测
- Kali linux 2016.2(Rolling)中metasploit的搜集特定地址的邮件地址
- Kali linux 2016.2(Rolling)里Metasploit连接(包括默认和自定义)的PostgreSQL数据库
- Kali linux 2016.2(Rolling)里Metasploit的常用模块
- Kali linux 2016.2(Rolling)里Metasploit连接(包括默认和自定义)的PostgreSQL数据库之后的切换到指定的工作空间
- Kali linux 2016.2(Rolling)里安装OpenVAS
- Kali linux 2016.2(Rolling)里Metasploit的口令猜测与嗅探
- Kali linux 2016.2(Rolling)里安装OpenVAS
- Kali linux 2016.2(Rolling)里安装OpenVAS
- MetaSploit攻击实例讲解------工具Meterpreter常用功能介绍(kali linux 2016.2(rolling))(详细)
- Kali linux 2016.2(Rolling)里Metasploit的数据库
- MetaSploit攻击实例讲解------社会工程学set攻击(kali linux 2016.2(rolling))(详细)
- Kali linux 2016.2(Rolling)中的Metasploit如何更新与目录结构初步认识
- Kali linux 2016.2(Rolling)中metasploit的端口扫描
- MetaSploit攻击实例讲解------攻击445端口漏洞(kali linux 2016.2(rolling))(详细)
- Kali linux 2016.2(Rolling)安装之后的常用配置
- Kali linux 2016.2(Rolling) 的详细安装(图文教程)附安装VMare Tools 增强工具
- Kali linux 2016.2(Rolling)里安装中文输入法