Introduction

Regular vulnerability scanning helps you discover weak points before attackers do. This guide covers OpenVAS (Greenbone) and Nmap for automated scanning.

1. Install OpenVAS (Greenbone Community Edition)

Follow official installation instructions. For Ubuntu, use sudo apt install gvm and run sudo gvm-setup.

2. Update Vulnerability Feeds

sudo greenbone-nvt-sync and sudo greenbone-scapdata-sync regularly.

3. Start OpenVAS Services

sudo gvm-start. Access web interface at https://localhost:9392 (admin password set during setup).

4. Create a Scan Target

Add your VPS IP address as a target. Configure scan config (Full and Fast).

5. Run a Vulnerability Scan

Launch the scan; it may take hours. Review the report for critical vulnerabilities.

6. Remediation Based on Findings

Patch missing updates, change weak passwords, remove insecure services.

7. Nmap Basic Scan

nmap -sV -sC -O your_vps_ip – service version, default scripts, OS detection.

8. Nmap Vulnerability Scripts

nmap --script vuln your_vps_ip – checks for known CVEs.

9. Schedule Weekly Scans

Use cron or Greenbone’s built‑in scheduler.

10. Scanning from an External VPS

Run scans from a separate VPS to simulate external attacker perspective.

11. PCI DSS Compliance Scanning

OpenVAS helps meet quarterly scanning requirements for external IPs.

12. Authenticated Scans

Provide SSH credentials to OpenVAS for deeper checks (package versions, weak configs).

13. False Positive Management

Manually verify and mark false positives to reduce noise.

14. Scan Reports for Auditors

Export PDF/HTML reports to demonstrate compliance.

15. Continuous Scanning with OpenVAS

Set up a scheduled task and email reports automatically.

16. Scanning Docker Containers

Use Docker Bench Security or Trivy for container‑specific vulnerabilities.

17. Web Application Scanning

Use ZAP or Nikto for web‑specific vulnerabilities (in addition to OpenVAS).

18. Limiting Scan Impact

Aggressive scans may cause high load; schedule during off‑peak or throttle.

19. Firewall Configuration for Scanning

Ensure your scanning VPS is allowed through the firewall.

20. Remediation Tracking

Log vulnerabilities and track fixes using a ticketing system.

Conclusion

Run OpenVAS scans monthly and Nmap weekly. Act on critical findings immediately.