{"id":139,"date":"2013-05-11T19:50:40","date_gmt":"2013-05-12T02:50:40","guid":{"rendered":"http:\/\/somethingk.com\/main\/?p=139"},"modified":"2017-03-23T11:47:44","modified_gmt":"2017-03-23T18:47:44","slug":"openvas-for-kali-linux-on-the-raspberry-pi","status":"publish","type":"post","link":"https:\/\/somethingk.com\/main\/openvas-for-kali-linux-on-the-raspberry-pi\/","title":{"rendered":"OpenVas for Kali Linux on the Raspberry Pi"},"content":{"rendered":"<section id=\"text-4\" class=\"widget boka-widget widget_text amr_widget\">\t\t\t<div class=\"textwidget\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block; text-align:center;\"\r\n     data-ad-layout=\"in-article\"\r\n     data-ad-format=\"fluid\"\r\n     data-ad-client=\"ca-pub-7619916617995509\"\r\n     data-ad-slot=\"9102150708\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><\/div>\n\t\t<\/section>\n<p>I&#8217;m working on creating a semi-portable security platform. I decided to experiment with installing and using the armel version of Kali Linux (the new backtrack OS) on the raspberry pi.\u00a0Initially, I faced a lot of problems getting OpenVAS to work on the device. This is one of the very few if only open source armel vulnerability scanners I could find. The following steps cover my successful attempt to setting up OpenVAS for anyone else interested in working with this tool in Kali on a Pi. Be prepared to spend a good amount of time waiting for the plugins to install and the database to update.<\/p>\n<div>\n<ol>\n<li>Downloaded and installed a fresh armel image of Kali (<a href=\"http:\/\/www.kali.org\/downloads\/\">http:\/\/www.kali.org\/downloads\/<\/a>). I used <a title=\"kali-custom-rpi.zip\" href=\"http:\/\/somethingk.com\/Downloads\/kali-custom-rpi.zip\" target=\"_blank\">this<\/a> image (Username: root, password: toor).<\/li>\n<li>Use a disk imager to image a SD card with the Kali image to run on the Pi. I used <a href=\"http:\/\/sourceforge.net\/projects\/win32diskimager\/\">Win32 Disk Imager<\/a>.<\/li>\n<li>Insert the SD card into the pi and power it up.<\/li>\n<li>You may want to expand the partition created by the disk imager, a tutorial on how to expand an active partition can be found <a href=\"http:\/\/elinux.org\/RPi_Resize_Flash_Partitions\">here<\/a>.<\/li>\n<li>Set the correct date if needed:\n<pre>date &lt;month&gt;&lt;day&gt;&lt;hour&gt;&lt;minute&gt;&lt;<wbr \/>year&gt;.&lt;second&gt;<\/pre>\n<\/li>\n<li>Create the openVAS certificate:\n<pre>openvas-mkcert<\/pre>\n<\/li>\n<li>Create the openVAS client certificate:\n<pre>openvas-mkcert-client -n om -i<\/pre>\n<\/li>\n<li>Download the openVAS NVT&#8217;s (This takes a few minutes):\n<pre>openvas-nvt-sync<\/pre>\n<\/li>\n<li>Start the openVAS scanner (This takes 30+ minutes.):\n<pre>openvassd<\/pre>\n<\/li>\n<li>Build the openVAS database (This can take an hour or more.):\n<pre>openvasmd --rebuild<\/pre>\n<\/li>\n<li>Create an admin account:\n<pre>openvasad -c 'add_user' -n openvasadmin -r Admin<\/pre>\n<\/li>\n<li>Update the \u00a0openVAS database with\u00a0the latest definition (This can take an hour or more.):\n<pre>openvasmd --update<\/pre>\n<\/li>\n<li>Migrate the database (This can take an hour or more.):\n<pre>openvasmd --migrate<\/pre>\n<\/li>\n<li>Rebuild one last time to be safe (This can take an hour or more.):\n<pre>openvasmd --rebuild<\/pre>\n<\/li>\n<li>Start the openVAS manager on port 9390:\n<pre>openvasmd -p 9390 -a 127.0.0.1<\/pre>\n<\/li>\n<li>Start the openVAS admin:\n<pre>openvasad -a 127.0.0.1 -p 9393<\/pre>\n<\/li>\n<li>Start GSAD, this is the client tool for openVAS:\n<pre>gsad --http-only -p 9392<\/pre>\n<\/li>\n<li>\u00a0Use the web client to interact with the tool, it can be accessed on http:\/\/&lt;IP OF PI&gt;:9392. You can log in with the admin account created earlier.<\/li>\n<\/ol>\n<p style=\"text-align: center;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2013\/05\/Capture.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-141\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2013\/05\/Capture.png\" alt=\"Capture\" width=\"697\" height=\"288\" srcset=\"https:\/\/somethingk.com\/main\/wp-content\/uploads\/2013\/05\/Capture.png 995w, https:\/\/somethingk.com\/main\/wp-content\/uploads\/2013\/05\/Capture-300x124.png 300w\" sizes=\"(max-width: 697px) 100vw, 697px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">That&#8217;s it! Now you can use this amazing tool to scan machines in a network!<\/p>\n<p style=\"text-align: left;\">After a reboot or shutdown, openVAS can be started with the commands:<\/p>\n<ol>\n<li>Start the openVAS scanner (This takes a few minutes this time.):\u00a0<span style=\"font-family: Consolas, Monaco, monospace; font-size: 12px; line-height: 18px;\">openvassd<\/span><\/li>\n<li>Start the openVAS manager on port 9390:\u00a0<span style=\"font-family: Consolas, Monaco, monospace; font-size: 12px; line-height: 18px;\">openvasmd -p 9390 -a 127.0.0.1<\/span><\/li>\n<li>Start the openVAS admin:\u00a0<span style=\"font-family: Consolas, Monaco, monospace; font-size: 12px; line-height: 18px;\">openvasad -a 127.0.0.1 -p 9393<\/span><\/li>\n<li>Start GSAD on port 9392, this is the client tool for openVAS:\u00a0<span style=\"font-family: Consolas, Monaco, monospace; font-size: 12px; line-height: 18px;\">gsad &#8211;http-only -p 9392<\/span><\/li>\n<\/ol>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m working on creating a semi-portable security platform. I decided to experiment with installing and using the armel version of Kali Linux (the new backtrack OS) on the raspberry pi.\u00a0Initially, I faced a lot of problems getting OpenVAS to work on the device. This is one of the very few if only open source armel vulnerability scanners I could find. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37,38],"tags":[63,62,59,61,60],"class_list":["post-139","post","type-post","status-publish","format-standard","hentry","category-kali","category-vulnerability-scanner","tag-install","tag-openvas","tag-pi","tag-raspberry-pi","tag-security-platform"],"_links":{"self":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/comments?post=139"}],"version-history":[{"count":9,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/139\/revisions"}],"predecessor-version":[{"id":1088,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/139\/revisions\/1088"}],"wp:attachment":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/media?parent=139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/categories?post=139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/tags?post=139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}