openvas test results



  • Actually doing some work while ranting in another thread.
    All the linux servers i have been scanning with openvas show basically the same vulnerabilities.
    0_1498587409964_e51944e6-d4e1-4ef5-a844-84b07bb0106a-image.png
    I think i know how to mitigate teh SSH weak encryption/MAC algorightms ones. Where can i find a list of good ciphers? the ssh_config and sshd_config show mostly these older ones listed as weak.
    The TCP timestamp one can possibly allow someone to see my server uptime? Why is that bad?
    Sorry for the basic questions.



  • Server up time could be indicative of an out of date system, so while a minor risk. It could lead to that system being a bigger target.



  • I thought this was going to be a sarcastic thread about an OpenVas(ectomy) service and how you were disappointed to find that they required you to bring your own tools and a library of books before they were able to start shaving or something.



  • @Grey Hopefully a service like that doesnt exist.



  • I did a scan of my test lab from the inside... it ain't pretty, lol.
    0_1498591931704_7d5d6365-3416-4f7c-8411-85a0458fe88d-image.png



  • @momurda said in openvas test results:

    Actually doing some work while ranting in another thread.
    All the linux servers i have been scanning with openvas show basically the same vulnerabilities.
    0_1498587409964_e51944e6-d4e1-4ef5-a844-84b07bb0106a-image.png
    I think i know how to mitigate teh SSH weak encryption/MAC algorightms ones. Where can i find a list of good ciphers? the ssh_config and sshd_config show mostly these older ones listed as weak.
    The TCP timestamp one can possibly allow someone to see my server uptime? Why is that bad?
    Sorry for the basic questions.

    Here's some hardened SSH stuff

    https://mangolassi.it/topic/10391/fairly-hardened-jump-box

    Also if you run SCAP on a machine it will give you a report with mitigation information.



  • Nessus has stuff like the time stamp thing too. It's mostly just informational. The only thing I could think of with the time stamp is someone could find machines with a high load and DoS them, so not really a big issue.



  • Openvas isn't as an informative as some other tools. Once you get the cve you can research it better using Google.



  • slightly off topic: did anyone manage to get the OVA working in VirtualBox? I just tryed and it crashed without any real backtrace. Now downloading the iso...



  • @matteo-nunziati said in openvas test results:

    slightly off topic: did anyone manage to get the OVA working in VirtualBox? I just tryed and it crashed without any real backtrace. Now downloading the iso...

    Just install Ubuntu or CentOS and run it from there. I think it''s very simple with pre-built packages. The VM is not recommended for anything but testing anyway.

    http://www.openvas.org/install-packages-v7.html



  • https://forums.atomicorp.com/viewtopic.php?f=31&t=8539#p44057 - this is step by step guide for Centos 7.



  • just configured an ubuntu VM. web interface was still waiting for seeding when I leaved the office



  • Yesterday afternoon I started a scan on the workstation network. Previously I was just using it for servers.
    Later, in the evening, I logged in to my Webroot admin console and saw that about 25% of the endpoints were reporting an infection. I just about lost my mind. Luckily, I soon found out that openvas uses winexecsvc.exe to do its thing on Windows machines. Just FYI if anybody else is using this and quite green like me.



  • @momurda said in openvas test results:

    Yesterday afternoon I started a scan on the workstation network. Previously I was just using it for servers.
    Later, in the evening, I logged in to my Webroot admin console and saw that about 25% of the endpoints were reporting an infection. I just about lost my mind. Luckily, I soon found out that openvas uses winexecsvc.exe to do its thing on Windows machines. Just FYI if anybody else is using this and quite green like me.

    I am really surprised webroot hasn't run into OpenVAS before.



  • @irj Yes. There are a couple forum posts about it, but they apparently haven't changed the default detection of it as bad.


Log in to reply
 

Looks like your connection to MangoLassi was lost, please wait while we try to reconnect.