Figure 4-4. Selecting a target in OpenVAS
Each operating system is going to be different, and this is especially true with Linux,
which is why there are different families in OpenVAS for local vulnerabilities. Each
distribution is configured a little differently and has different sets of packages.
Beyond the distribution, users can have a lot of choices for categories of packages.
Once the base is installed, hundreds of additional packages could typically be
installed, and each of those packages can introduce vulnerabilities.
One common approach to hardening is to limit the number of
packages that are installed. This is especially true when it comes to
server systems in which the bare minimum amount of software
necessary to operate the services should be installed.
Root Kits
While not strictly a vulnerability scanner, it’s worth knowing about Rootkit Hunter.
This program can be run locally on a system to determine whether it has been com‐
promised and has a root kit installed. A
root kit
is a software package that is meant to
facilitate a piece of malware. It may include replacement operating system utilities to
hide the existence of the running malware. For example, the
ps
program may be
altered to not show the processes associated with the malware. Additionally,
ls
may
hide the existence of the malware files. Root kits may also implement a backdoor that
will allow attackers remote access.