Backtrack 5- OpenVas Tutorial

OpenVas is a open source vulnerability assesment system just like nessus, openVas used to find the vulnerabilities on a computer system, it is open source so you dont need to buy it, however you can get home feed of nessus for free too, but we consider both of them. If you want to know more about OpenVas than click here, and for nessus click here.

You can find nessu on backtrack 5 but you have to install openvas on backtrack5, so below is the tutorial for Openvas it includes how to install openvas in backtrack 5 and some basic usage.


Backtrack5 is not necessary to run openvas, if you are using some other version of backtrack or if you are using some other distro like Ubuntu than the procedure is same.

How To Install OpenVas
  • Open terminal on bt5 or ubuntu and type exactly
[email protected]:~# apt-get install openvas

[email protected]:~# sudo apt-get update

  • It begins your openvas installation and update all the applications. When Openvas has been installed you can find it on Application –> Backtrack –> Vulnerability assessment –> vulnerability scanner –> Openvas . See the picture.

  • On the next step click on openvas-check-setup, it will show you the problem and suggest some solution.
  • Its time to add user, from the menu select Openvas adduser, enter the login name and password, for rule type ctrl-d.

  • Now click on OpenVas NVT sync, by this you will get the latest NVT’s from openvas database, you must do this step frequently to make update your Openvas.
  • Start openvas scanner from the menu, it may takes some time.
  • Open terminal for setting up openvas manager, use the command 

[email protected]:~# openvas-mkcert-client -n om -i

rebuild the database by the command 

[email protected]:~# openvasmd –rebuild

  • On the terminal type the command to set openvas administrator 

[email protected]:~# openvasad -c ‘add_user’ -n openvasadmin -r Admin

  • Now click on start Openvas manager from the menu and use the command. 

[email protected]:~# openvasmd -p 9390 -a 127.0.0.1

  • Start openvas administrator from the menu and type

[email protected]:~# openvasad -a 127.0.0.1 -p 9393

Your are almost done, just start Greenbone security assistant and use

[email protected]:~# gsad –http-only –listen=127.0.0.1 -p 9392

  • Now open your web browser and type http://127.0.0.1:9392/
  • Use your username and password that has been set on previous step.
Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Become a spy in your own right with Xnspy Android spying app

Having become widely popular among parents and employers, spying apps have become quite the norm nowadays. Android spying apps have made it a lot...

e-Services Portals Potentially Expose Government Infrastructure to File-based Attacks

More and more users are embracing technology to perform their day-to-day activities. It’s not only private businesses that are forced to establish digital channels...

What is Nmap? How to use Nmap for Information Gathering

Nmap stands for Network Mapper, a powerful network scanning and host detection tool that is being used to perform reconnaissance in a very first...

Digital Forensics Investigation using Autopsy In Kali Linux

Autopsy is one of the digital forensics tools use to investigate what happened on a computer. It offers a GUI access to variety of...