# Course #231: Mastering GVM for Effective Penetration Testing
## Section 1: Introduction to GVM
### Introduction to GVM
Greenbone Vulnerability Management (GVM) is an open-source framework used for vulnerability scanning and management. It serves as the backbone for security assessments, helping organizations identify and mitigate vulnerabilities in their networks and systems. GVM is commonly deployed in penetration testing engagements, making it an essential tool for security professionals.
In this section, we will guide you through the process of installing and configuring GVM on Kali Linux, demonstrate its usage with step-by-step instructions, and provide real-world use cases to illustrate its capabilities.
### Installation and Configuration on Kali Linux
**Prerequisites:**
Before we begin the installation process, ensure that Kali Linux is up to date. You can update your system using the following commands:
"`bash
sudo apt update
sudo apt upgrade
"`
**Step 1: Installing GVM**
Kali Linux comes with GVM pre-installed in recent versions. However, if you need to install it manually or update your installation, you can follow these steps:
1. **Install GVM:**
Use the following command to install GVM on Kali Linux:
sudo apt install gvm
2. **Set up GVM:**
After installation, initialize GVM with the following command:
sudo gvm-setup
This command configures the database and sets up the necessary components.
3. **Check Installation:**
Verify the installation by checking the status of GVM services:
sudo gvm-check-setup
This command will check if everything is in place. If there are issues, follow the provided recommendations to resolve them.
**Step 2: Configuring GVM**
After installation, you need to configure GVM to suit your needs:
1. **Start the GVM Services:**
Start the GVM services using the following command:
sudo gvm-start
2. **Accessing the GVM Web Interface:**
By default, GVM is accessed via a web interface at `https://localhost:9392`. Open a web browser and navigate to this address. You will be prompted to enter your username and password. The default credentials are usually set during the `gvm-setup` process.
3. **Creating Users:**
Inside the GVM interface, navigate to the “User Management” section to create additional users with appropriate permissions.
4. **Updating the Feed:**
Ensure that your vulnerability feeds are up-to-date. This can be done within the GVM interface under “Feed Status” or by using the following command:
sudo gvm-feed-update
### Step-by-Step Usage of GVM
Now that you have GVM installed and configured, let’s dive into how to use it effectively for penetration testing.
**Step 1: Creating a Target**
1. **Login to the GVM Web Interface.**
2. **Navigate to the 'Scans' Section.**
3. **Click on 'Targets' and then 'Add Target':**
Here, you will provide the details of the target you want to scan, such as its IP address or hostname.
#### Example:
– **Name:** `My Test Server`
– **Hosts:** `192.168.1.10`
4. **Save the Target.**
**Step 2: Creating a New Scan Task**
1. **Navigate to 'Scans' > 'Tasks'.**
2. **Click on 'Add Task':**
Fill in the required fields:
– **Name:** `Test Scan`
– **Target:** Select the target you created earlier.
– **Scanner:** Choose the default scanner.
3. **Configure Scan Settings:**
Adjust the scan settings based on the requirements of your penetration test. You may choose from various scan configurations, including full and fast scans, or customize it as per your testing strategy.
4. **Save the Task.**
**Step 3: Running the Scan**
1. **In the Tasks section, find your created task.**
2. **Click on the Play button to start the scan.**
3. **Monitor Progress:**
You can view the scan progress in real-time. GVM will provide logs and status updates.
**Step 4: Analyzing Scan Results**
Once the scan is complete, GVM will generate a comprehensive report that includes vulnerability findings:
1. **Navigate to 'Scans' > 'Results'.**
2. **Select your completed scan:**
You can view details such as:
– Identified vulnerabilities
– Risk levels (low, medium, high)
– Suggested remediation steps
3. **Exporting Results:**
GVM allows you to export scan results in various formats including PDF, HTML, and XML. This is useful for documentation and reporting purposes.
# Export example command (CLI)
sudo gvmd-cli –export –format PDF –output-path /path/to/save/report.pdf
### Real-World Use Cases
#### Use Case 1: Network Vulnerability Assessment
In this scenario, a company wants to assess its internal network for vulnerabilities. The pentester can utilize GVM to scan all internal IP addresses to identify misconfigurations, outdated software, and security issues.
1. Set the target to the entire subnet (e.g., `192.168.1.0/24`).
2. Run a full scan.
3. Analyze the findings and prioritize remediation efforts based on risk levels.
#### Use Case 2: Web Application Vulnerability Assessment
For organizations with critical web applications, it’s essential to identify vulnerabilities such as SQL injection, XSS, and misconfigurations.
1. Create a target for the application server.
2. Configure a scan that focuses on web vulnerabilities.
3. Review the detailed findings and collaborate with the development team for remediation.
### Technical Explanations
**GVM Architecture:**
GVM is composed of several essential components working together:
– **Greenbone Security Assistant (GSA):** The web interface that allows users to interact with GVM.
– **OpenVAS Scanner:** The scanning engine that performs vulnerability assessments.
– **Greenbone Vulnerability Manager (GVMD):** The management engine that handles tasks, users, and reports.
– **Database (PostgreSQL):** Stores scan results, configurations, and user data.
**External Reference Links:**
– [GVM Official Documentation](https://www.greenbone.net/en/community-gvm-11/)
– [Kali Linux Tools – GVM](https://www.kali.org/tools/gvm/)
– [OpenVAS GitHub Repository](https://github.com/greenbone/openvas)
In this section, we have covered the fundamental aspects of installing, configuring, and using GVM for effective penetration testing. In the next section, we will delve deeper into advanced techniques, custom configurations, and exploitative scenarios to maximize the effectiveness of GVM in varied environments.
—
Made by pablo rotem / פבלו רותם
📊 נתוני צפיות
סה"כ צפיות: 1
מבקרים ייחודיים: 1
- 🧍 172.69.214.168 (
Canada)