OpenVAS-GVM-Install
OpenVAS-GVM-Install copied to clipboard
OpenVAS Install script / GVM install script (2023 Source and Docker build scripts)
OpenVAS GVM Vulnerability Scanner Install Scripts
📦 SOURCE build auto setup link
wget https://raw.githubusercontent.com/itiligent/Greenbone-OpenVAS-Install/main/gvm-build-from-source.sh && chmod +x gvm-build-from-source.sh && ./gvm-build-from-source.sh
🐳 DOCKER build auto setup link
wget https://raw.githubusercontent.com/itiligent/Greenbone-OpenVAS-Install/main/gvm-build-docker.sh && chmod +x gvm-build-docker.sh && ./gvm-build-docker.sh
Note: The Official GVM Docker containers should be considered experimental as there does not seem to be much QA of container updates. For stable production use, the source build is recommended.
📋 Prerequisites
- Ubuntu 22.04 LTS / Debian 12 or 11 / Raspbian Bullseye
- Minimum 8GB RAM and 80GB HDD
- Private DNS entries matching the server IP address (required for TLS)
- Email relay permitted from the scanner appliance's IP address
- An O365 (or similar service) email-enabled account with an app password configured
- The user executing the wget installer script must be a member of the sudo group 🛡️
📧 Configuring email reporting
Both build options install Postfix for sending of scan reports to email. (Normally a GVM Pro option)
- For the the source build option, simply run
add-smtp-relay-o365.sh - With the Docker option, Greenbone's container updates will occasionally overwrite the Postfix install. The update script will automatically check and re-add Postfix, but your SMTP config must be re-added. You can modify
add-docker-smtp-relay-0365.shto automatically re-insate your SMTP config and automate this via the $DOWNLOAD_DIR/update-gvm.sh update script.
⬆️ Upgrading and updating the scanner
- Source Builds: CVE feed updates are scheduled by the installer daily at a random time. To upgrade the scanner application run
gvm-build-from-source-upgrader.sh. - Docker builds: As CVE feed updates are bundled as container updates, the included
update-gvm.shis set to automatically pull containers weekly. (Daily container updates greatly increase the likelihood of breakage.)
🔒 SSL Note
For both build options, an Nginx reverse proxy is installed and browser certificates are also created locally ($site.crt, $site.key & $site.pfx). Instructions for importing these into client systems to avoid browser TLS error messages is provided on screen when the script completes.
💻 Performing vulnerability scans with Windows SMB authentication
If you wish to perform scans with Windows SMB authentication, follow these steps:
- Run the included PowerShell script
prep-windows-gvm-cred-scan.ps1on all Windows hosts to be scanned with SMB credentials. - Create a GVM service account on all Windows hosts to be scanned, adding it to the local Administrators group (this service account must NOT be a built-in Windows account).
- Create a new credentials object in the GVM management console reflecting the new Windows service account.
- Create a scan target, add Windows devices to scan, and select the new credentials object for this target.
- Create a new scan task for the credentialed scan target from step 4, then run or schedule the scan task.