• OpenVAS Reports
  • | Chapter 4: Looking for Vulnerabilities




    Download 22,59 Mb.
    Pdf ko'rish
    bet128/225
    Sana14.05.2024
    Hajmi22,59 Mb.
    #232856
    1   ...   124   125   126   127   128   129   130   131   ...   225
    Bog'liq
    learningkalilinux

    134 | Chapter 4: Looking for Vulnerabilities


    bility scanning, is to improve the security posture of your target. If the organization is
    getting your recommendations and then not doing anything with them, that’s worse
    than not running the scans at all. What happens when you present a report to the
    organization you are working for is that they become aware of the vulnerabilities you
    have identified. This information can then be used against them if they don’t do any‐
    thing with what you have told them.
    OpenVAS Reports
    The report is the most important aspect of your work. You will be writing your own
    report when you are complete, but the report that is issued from the vulnerability
    scanner is helpful for you to understand where you might start looking. There are
    two things to be aware of when we start to look at vulnerability scanner reports. First,
    the vulnerability scanner uses specific signatures to determine whether the vulnera‐
    bility is there. This may be something like banner grabbing to compare version num‐
    bers. You can’t be sure that the vulnerability exists because a tool like OpenVAS does
    not exploit the vulnerability. Second, and this is related, you can get false positives.
    Since the vulnerability scanner does not exploit the vulnerability, the best it can do is
    get a probability.
    If you are not running a scan with credentials, you are going to miss detecting a lot of
    vulnerabilities. You will also have a higher potential for getting false positives. A 
    false
    positive
    is an indication that the vulnerability exists when it doesn’t. This is why a
    report from OpenVAS or any other scanner isn’t sufficient. Since there is no guaran‐
    tee that the vulnerability actually exists, you need to be able to validate the reports so
    your final report presents legitimate vulnerabilities that need to be remediated.
    However, enough with the remonstration. Let’s get on with looking at the reports so
    we can start determining what is legitimately troubling and what may be less con‐
    cerning. The first thing we need to do is go back to the OpenVAS web interface after
    the scan is complete, and scans of large networks with a lot of services can be very
    time-consuming, especially if you are doing deep scans. In the Scans menu, you will
    find the item Reports. From there, you get to the Report dashboard. That will give
    you a list of all the scans you have done as well as some graphs of the severity of the
    findings from your scans. You can see the Report dashboard in 
    Figure 4-12
    .

    Download 22,59 Mb.
    1   ...   124   125   126   127   128   129   130   131   ...   225




    Download 22,59 Mb.
    Pdf ko'rish