Once you have entered your target or targets, all you need to do is click Start Scan,
and OpenVAS is off to the races, so to speak. You have started your very first vulnera‐
bility scan.
It may be useful to have some vulnerable systems around when you
are running your scans. Although you can get various systems (and
a simple web search for vulnerable operating systems will turn
them up) one is really useful. Metasploitable 2 is a deliberately vul‐
nerable Linux installation. Metasploitable 3 is the updated version
based on Windows Server 2008. Metasploitable 2 is a straight-up
download. Metasploitable 3 is a build-it-on-your-own-system
operating system. It requires VirtualBox and additional software.
We’ll get into doing a scan from end to end, but let’s take a look at the Advanced Scan
Wizard, shown in
Figure 4-8
. This will give you a quick look ahead to what we will be
working with on a larger scale when we move to creating scans from start to finish.
Figure 4-8. Advanced Scan Wizard