{"id":5570,"date":"2020-04-23T23:38:01","date_gmt":"2020-04-23T20:38:01","guid":{"rendered":"https:\/\/kifarunix.com\/?p=5570"},"modified":"2024-03-14T20:11:40","modified_gmt":"2024-03-14T17:11:40","slug":"install-and-setup-gvm-11-on-ubuntu-20-04","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/install-and-setup-gvm-11-on-ubuntu-20-04\/","title":{"rendered":"Install and Setup GVM 11 on Ubuntu 20.04"},"content":{"rendered":"\n<p>In this guide, we are going to learn how to install and setup <a href=\"https:\/\/community.greenbone.net\/t\/gvm-11-stable-initial-release-2019-10-14\/3674\" target=\"_blank\" rel=\"noopener\">GVM 11<\/a> on Ubuntu 20.04. <a rel=\"noreferrer noopener\" href=\"https:\/\/community.greenbone.net\/\" target=\"_blank\"><strong>G<\/strong>reenbone&nbsp;<strong>V<\/strong>ulnerability&nbsp;<strong>M<\/strong>anagement (GVM)<\/a>, was previously known as OpenVAS, is a network security scanner which provides a set of network vulnerability tests (NVTs) to detect security loopholes in systems and applications. As of this writing, <a rel=\"noreferrer noopener\" href=\"https:\/\/community.greenbone.net\/t\/gvm-11-stable-initial-release-2019-10-14\/3674\" target=\"_blank\">GVM 11 is the current stable release<\/a>.<\/p>\n\n\n\n<p>Well, GVM 11 was set to retire by end of 2020. Try to new GVM 20.08 by following the links below;<\/p>\n\n\n\n<p><a aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/install-and-setup-gvm-20-08-on-debian\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Install and setup GVM 20.08 on Debian 10<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/install-and-setup-gvm-20-08-on-ubuntu\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Install and Setup GVM 20.08 on Ubuntu 20.04<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"install-gvm-11-ubuntu-20.04\"><a href=\"#install-gvm-11-ubuntu-20.04\">Installing GVM 11 on Ubuntu 20.04<\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Prerequisites<\/h3>\n\n\n\n<p>In this demo, we will be building GVM 11 on Ubuntu 20.04 from source code. As such, below are the system requirements I would personally recommend.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>At least 4 GB RAM<\/li>\n\n\n\n<li>At least 4 vCPUs<\/li>\n\n\n\n<li>More than 8 GB disk space (We used 16 GB in this demo)<\/li>\n<\/ul>\n\n\n\n<p>These requirements will vary depending on your use cases, however. Just be sure to give &#8220;enough&#8221;.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Run System Update<\/h3>\n\n\n\n<p>To begin with, update and upgrade your system packages;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt update<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt upgrade<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"create-gvm-11-user\"><a href=\"#create-gvm-11-user\">Create GVM User<\/a><\/h3>\n\n\n\n<p>In this demo, we are going to run GVM as a non privileged system user. As such, we are going to create <code><strong>gvm<\/strong><\/code> user and group.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>useradd -r -d \/opt\/gvm -c \"GVM User\" -s \/bin\/bash gvm<\/code><\/pre>\n\n\n\n<p>Create the GVM user directory as specified by option <code>-d<\/code> in the command above and set the user and group ownership to <code>gvm<\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>mkdir \/opt\/gvm<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>chown gvm:gvm \/opt\/gvm<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"install-gvm-11-required-dependencies\"><a href=\"#install-gvm-11-required-dependencies\">Install Required Build Tools<\/a><\/h3>\n\n\n\n<p>In order to successfully build GVM 11 on Ubuntu 20.04, you need to install a number of required dependencies and build tools.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt install gcc g++ make bison flex libksba-dev curl redis libpcap-dev \\\ncmake git pkg-config libglib2.0-dev libgpgme-dev nmap libgnutls28-dev uuid-dev \\\nlibssh-gcrypt-dev libldap2-dev gnutls-bin libmicrohttpd-dev libhiredis-dev \\\nzlib1g-dev libxml2-dev libradcli-dev clang-format libldap2-dev doxygen \\\ngcc-mingw-w64 xml-twig-tools libical-dev perl-base heimdal-dev libpopt-dev \\\nlibsnmp-dev python3-setuptools python3-paramiko python3-lxml python3-defusedxml python3-dev gettext python3-polib xmltoman \\\npython3-pip texlive-fonts-recommended texlive-latex-extra --no-install-recommends xsltproc<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"install-yarn-ubuntu-20.04\"><a href=\"#install-yarn-ubuntu-20.04\">Install Yarn on Ubuntu 20.04<\/a><\/h4>\n\n\n\n<p>Next, install Yarn JavaScript package manager<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>curl -sS https:\/\/dl.yarnpkg.com\/debian\/pubkey.gpg | apt-key add -<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo \"deb https:\/\/dl.yarnpkg.com\/debian\/ stable main\" | tee \/etc\/apt\/sources.list.d\/yarn.list<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt update<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt install yarn -y<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"install-postgresql-ubuntu20.04\">Install PostgreSQL on<a href=\"#install-postgresql-ubuntu20.04\">#install-postgresql-ubuntu20.04<\/a> Ubuntu 20.04<\/h4>\n\n\n\n<p>GVM 11 has dropped support for sqlite3 and it currently support only PostgreSQL as the backend database. Therefore, you need to install PostgreSQL on Ubuntu 20.04;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>apt install postgresql postgresql-contrib postgresql-server-dev-all<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-postgresql-user-n-db\"><a href=\"#create-postgresql-user-n-db\">Create PostgreSQL User and Database<\/a><\/h4>\n\n\n\n<p>Once the installation is done, create the PostgreSQL user and database for Greenbone Vulnerability Management Daemon (gvmd). Note that the database and user should be created as PostgreSQL user,&nbsp;<strong>postgres<\/strong>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo -Hiu postgres\ncreateuser gvm\ncreatedb -O gvm gvmd<\/code><\/pre>\n\n\n\n<p>Grant PostgreSQL User DBA Roles<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>psql gvmd\ncreate role dba with superuser noinherit;\ngrant dba to gvm;\ncreate extension \"uuid-ossp\";\n\\q\nexit<\/code><\/pre>\n\n\n\n<p>Once that is done, restart PostgreSQL;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl restart postgresql<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl enable postgresql<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"install-gvm-11-from-source-ubuntu-20.04\"><a href=\"#install-gvm-11-from-source-ubuntu-20.04\">Building GVM 11 from Source Code<\/a><\/h3>\n\n\n\n<p>There are different tools required to install GVM 11. These include;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>GVM Libraries<\/li>\n\n\n\n<li>OpenVAS Scanner<\/li>\n\n\n\n<li>OSPd<\/li>\n\n\n\n<li>ospd-openvas<\/li>\n\n\n\n<li>Greenbone Vulnerability Manager<\/li>\n\n\n\n<li>Greenbone Security Assistant <\/li>\n\n\n\n<li>Python-GVM<\/li>\n\n\n\n<li>GVM-Tools <\/li>\n\n\n\n<li>OpenVAS SMB<\/li>\n<\/ul>\n\n\n\n<p>Every component has <strong>README.md<\/strong>&nbsp;and a&nbsp;<strong>INSTALL.md<\/strong>&nbsp;file that explains how to build and install it.<\/p>\n\n\n\n<p>Since we are running GVM as non-privileged user, gvm, then we will install all the GVM configuration files and libraries under, <code><strong>\/opt\/gvm<\/strong><\/code>.<\/p>\n\n\n\n<p>Update the PATH environment variable on <code><strong>\/etc\/environment<\/strong><\/code>, to include the GVM binary path such that it looks like;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/environment<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>PATH=\"\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin:\/usr\/games:\/usr\/local\/games:<strong>\/opt\/gvm\/bin:\/opt\/gvm\/sbin:\/opt\/gvm\/.local\/bin<\/strong>\"<\/code><\/pre>\n\n\n\n<p>Add GVM library path to <code><strong>\/etc\/ld.so.conf.d<\/strong><\/code>. <\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo \"\/opt\/gvm\/lib\" &gt; \/etc\/ld.so.conf.d\/gvm.conf<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Build and Install GVM 11<\/h4>\n\n\n\n<p>Switch to GVM user, gvm and create a temporary directory to store GVM source files.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>su - gvm<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>mkdir \/tmp\/gvm-source<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"download-gvm-11-source-files\"><a href=\"#download-gvm-11-source-files\">Download GVM Source Files<\/a><\/h4>\n\n\n\n<p>Navigate to temporary directory created above and run the subsequent commands to clone the GVM github branch files.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd \/tmp\/gvm-source<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone -b gvm-libs-11.0 https:\/\/github.com\/greenbone\/gvm-libs.git<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone https:\/\/github.com\/greenbone\/openvas-smb.git<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone -b openvas-7.0 https:\/\/github.com\/greenbone\/openvas.git<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone -b ospd-2.0 https:\/\/github.com\/greenbone\/ospd.git<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone -b ospd-openvas-1.0 https:\/\/github.com\/greenbone\/ospd-openvas.git<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone -b gvmd-9.0 https:\/\/github.com\/greenbone\/gvmd.git<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>git clone -b gsa-9.0 https:\/\/github.com\/greenbone\/gsa.git<\/code><\/pre>\n\n\n\n<p>Once the source files are in place, proceed to build and install GVM on Ubuntu 20.04.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>gvm@ubuntu20:\/tmp\/gvm-source$ ls\n<strong>gsa gvmd gvm-libs openvas openvas-smb ospd ospd-openvas<\/strong><\/code><\/pre>\n\n\n\n<p>Note that we will install all GVM files and libraries to a non-standard location, <code>\/opt\/gvm<\/code>. As such, you need to set the <code>PKG_CONFIG_PATH<\/code> environment variable to the location of your pkg-config<br>files before configuring:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>export PKG_CONFIG_PATH=\/opt\/gvm\/lib\/pkgconfig:$PKG_CONFIG_PATH<\/code><\/pre>\n\n\n\n<p>Be sure to replace the path, <code><strong>\/opt\/gvm<\/strong><\/code>, accordingly.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"install-gvm-11-libraries\"><a href=\"#install-gvm-11-libraries\">Build and Install GVM 11 Libraries<\/a><\/h4>\n\n\n\n<p>Change to GVM libraries directory;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd gvm-libs<\/code><\/pre>\n\n\n\n<p>Create a build directory and change into it;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>mkdir build\ncd build<\/code><\/pre>\n\n\n\n<p>Configure the build;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cmake .. -DCMAKE_INSTALL_PREFIX=\/opt\/gvm<\/code><\/pre>\n\n\n\n<p>Next, compile and install GVM libraries<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>make<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>make install<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"install-openvas-scanner-smb\"><a href=\"#install-openvas-scanner-smb\">Build and Install OpenVAS scanner and OpenVAS SMB<\/a><\/h4>\n\n\n\n<p>Open Vulnerability Assessment Scanner (OpenVAS) is a full-featured scan engine that executes a continuously updated and extended feed of Network Vulnerability Tests (NVTs).<\/p>\n\n\n\n<p>OpenVAS SMB provides modules for the OpenVAS Scanner to interface with Microsoft Windows Systems through the Windows Management Instrumentation API and a&nbsp;<code>winexe<\/code>&nbsp;binary to execute processes remotely on that system.<\/p>\n\n\n\n<p>Build and install openvas-smb;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd ..\/..\/openvas-smb\/\nmkdir build\ncd build\ncmake .. -DCMAKE_INSTALL_PREFIX=\/opt\/gvm\nmake\nmake install<\/code><\/pre>\n\n\n\n<p>Build and install OpenVAS scanner;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd ..\/..\/openvas<\/code><\/pre>\n\n\n\n<p>Proceed to build and install openvas.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>mkdir build\ncd build\ncmake .. -DCMAKE_INSTALL_PREFIX=\/opt\/gvm\nmake\nmake install<\/code><\/pre>\n\n\n\n<p>If you encounter the error, <code><strong>...error: \u2018pcap_lookupdev\u2019 is deprecated: use 'pcap_findalldevs'...<\/strong><\/code> while compiling openvas, edit the <code><strong>CMakeLists.txt<\/strong><\/code> file and replace the line as shown below.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim ..\/..\/openvas\/CMakeLists.txt<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>...\n#set (CMAKE_C_FLAGS_DEBUG \"${CMAKE_C_FLAGS_DEBUG} ${COVERAGE_FLAGS}\")\n<strong>set (CMAKE_C_FLAGS_DEBUG \"${CMAKE_C_FLAGS_DEBUG} -Werror -Wno-error=deprecated-declarations\")<\/strong>\n...<\/code><\/pre>\n\n\n\n<p>Once done, save and exit the file and<strong> rerun the installation<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"configure-openvas-scanner-gvm11\"><a href=\"#configure-openvas-scanner-gvm11\">Configuring OpenVAS Scanner<\/a><\/h4>\n\n\n\n<p>The host scan information is stored temporarily on Redis server. The default configuration of Redis server is <code>\/etc\/redis\/redis.conf<\/code>.<\/p>\n\n\n\n<p>Switch back to privileged user and proceed.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>exit<\/code><\/pre>\n\n\n\n<p>To begin run the command below to create the cache to the installed shared libraries;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>ldconfig<\/code><\/pre>\n\n\n\n<p>Next, copy OpenVAS scanner Redis configuration file, <code>redis-openvas.conf<\/code>, to the same Redis config directory;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cp \/tmp\/gvm-source\/openvas\/config\/redis-openvas.conf \/etc\/redis\/<\/code><\/pre>\n\n\n\n<p>Update the ownership of the configuration.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>chown redis:redis \/etc\/redis\/redis-openvas.conf<\/code><\/pre>\n\n\n\n<p>Update the path to Redis unix socket on the <code>\/opt\/gvm\/etc\/openvas\/openvas.conf<\/code>&nbsp;using the&nbsp;<strong><code>db_address<\/code><\/strong>&nbsp;parameter as follows;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo \"db_address = <strong><strong>\/run\/redis-openvas\/redis.sock<\/strong><\/strong>\" &gt; \/opt\/gvm\/etc\/openvas\/openvas.conf<\/code><\/pre>\n\n\n\n<p>Note, the Unix socket path is defined on <code>\/etc\/redis\/redis-openvas.conf<\/code> file.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>chown gvm:gvm \/opt\/gvm\/etc\/openvas\/openvas.conf<\/code><\/pre>\n\n\n\n<p>Add gvm user to redis group;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>usermod -aG redis gvm<\/code><\/pre>\n\n\n\n<p>You can also optimize Redis server itself improve the performance by making the following adjustments;<\/p>\n\n\n\n<p>Increase the value of somaxconn in order to avoid slow clients connections issues.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo \"net.core.somaxconn = 1024\" &gt;&gt; \/etc\/sysctl.conf<\/code><\/pre>\n\n\n\n<p>Redis background save may fail under low memory condition. To avoid this, enable memory overcommit (<strong>man 5 proc)<\/strong>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo 'vm.overcommit_memory = 1' &gt;&gt; \/etc\/sysctl.conf<\/code><\/pre>\n\n\n\n<p>Reload sysctl variables created above.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sysctl -p<\/code><\/pre>\n\n\n\n<p>To avoid creation of latencies and memory usage issues with Redis, disable Linux Kernel\u2019s support for Transparent Huge Pages (THP). To easily work around this, create a systemd service unit for this purpose.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/systemd\/system\/disable_thp.service<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>[Unit]\nDescription=Disable Kernel Support for Transparent Huge Pages (THP)\n\n[Service]\nType=simple\nExecStart=\/bin\/sh -c \"echo 'never' &gt; \/sys\/kernel\/mm\/transparent_hugepage\/enabled &amp;&amp; echo 'never' &gt; \/sys\/kernel\/mm\/transparent_hugepage\/defrag\"\n\n[Install]\nWantedBy=multi-user.target<\/code><\/pre>\n\n\n\n<p>Reload systemd configurations;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl daemon-reload<\/code><\/pre>\n\n\n\n<p>Start and enable this service to run on system boot.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl enable --now disable_thp<\/code><\/pre>\n\n\n\n<p>Restart OpenVAS Redis server<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl enable --now redis-server@openvas<\/code><\/pre>\n\n\n\n<p>A number of Network Vulnerability Tests (NVTs) require root privileges to perform certain operations. Since <code>openvas<\/code> is launched from an <code>ospd-openvas<\/code> process, via sudo, add the line below to sudoers file to ensure that the <code>gvm<\/code> user used in this demo can run the openvas with elevated rights using passwordless sudo.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo \"gvm ALL = NOPASSWD: \/opt\/gvm\/sbin\/openvas\" &gt; \/etc\/sudoers.d\/gvm<\/code><\/pre>\n\n\n\n<p>Also, update the <code><strong>secure_path<\/strong><\/code> to include the GVM <code>\/sbin<\/code> paths, <code><strong>\/opt\/gvm\/sbin<\/strong><\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>visudo<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>Defaults secure_path=\"\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin:\/snap\/bin:<strong>\/opt\/gvm\/sbin<\/strong>\"<\/code><\/pre>\n\n\n\n<p>Also, enable <code>gvm<\/code> user to run GSA web application daemon, <code>gsad<\/code>, with passwordless sudo.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>echo \"gvm ALL = NOPASSWD: \/opt\/gvm\/sbin\/gsad\" &gt;&gt; \/etc\/sudoers.d\/gvm<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Update NVTs<\/h4>\n\n\n\n<p>Update Network Vulnerability Tests feed from Greenbone Security Feed\/Community Feed using the <code>greenbone-nvt-sync<\/code> command.<\/p>\n\n\n\n<p>The <code>greenbone-nvt-sync<\/code> command <strong>must not<\/strong> be executed as privileged user root, hence switch back to GVM user we created above and update the NVTs.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>su - gvm<\/code><\/pre>\n\n\n\n<p>Next, update the NVTs as openvas user;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>greenbone-nvt-sync<\/code><\/pre>\n\n\n\n<p>Once the update is done, you need to update Redis server with the same VT info from VT files;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo openvas --update-vt-info<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"install-gvm-ubuntu20.04\"><a href=\"#install-gvm-ubuntu20.04\">Build and Install Greenbone Vulnerability Manager<\/a><\/h4>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>export PKG_CONFIG_PATH=\/opt\/gvm\/lib\/pkgconfig:$PKG_CONFIG_PATH<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd \/tmp\/gvm-source\/gvmd\nmkdir build\ncd build\ncmake .. -DCMAKE_INSTALL_PREFIX=\/opt\/gvm\nmake\nmake install<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"install-gsa-ubuntu20.04\"><a href=\"#install-gsa-ubuntu20.04\">Build and Install Greenbone Security Assistant<\/a><\/h4>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd ..\/..\/gsa\nmkdir build\ncd build\ncmake .. -DCMAKE_INSTALL_PREFIX=\/opt\/gvm\nmake\nmake install<\/code><\/pre>\n\n\n\n<p>Update GVM CERT and SCAP data from the feed servers;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>greenbone-scapdata-sync\ngreenbone-certdata-sync<\/code><\/pre>\n\n\n\n<p>Consider setting cron jobs to run the nvts, cert and scap data update scripts at your preferred frequency to pull updates from the feed servers.<\/p>\n\n\n\n<p>Next, run the command below to generate certificates gvmd. Server certificates are used for authentication while client certificates are primarily used for authorization. More on <code><strong>man gvm-manage-certs<\/strong><\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>gvm-manage-certs -a<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"build-install-ospd-ospd-openvas\"><a href=\"#build-install-ospd-ospd-openvas\">Build and Install OSPd and OSPd-OpenVAS<\/a><\/h4>\n\n\n\n<p>Open Scanner Protocol (OSP) creates a unified interface for different security scanners and makes their control flow and scan results consistently available under the central Greenbone Vulnerability Manager service.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>export PKG_CONFIG_PATH=\/opt\/gvm\/lib\/pkgconfig:$PKG_CONFIG_PATH<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>mkdir -p \/opt\/gvm\/lib\/python3.8\/site-packages\/\nexport PYTHONPATH=\/opt\/gvm\/lib\/python3.8\/site-packages\ncd \/tmp\/gvm-source\/ospd\npython3 setup.py install --prefix=\/opt\/gvm<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>cd ..\/ospd-openvas\npython3 setup.py install --prefix=\/opt\/gvm<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"running-gvm11-services-ubuntu20.04\"><a href=\"#running-gvm11-services-ubuntu20.04\">Start OpenVAS Scanner, GSA and GVM services<\/a><\/h3>\n\n\n\n<p>Run the commands below as <code>gvm<\/code> user to start OpenVAS scanner, GSA (WebUI service) and GVM daemon. Execute the commands in the presented order.<\/p>\n\n\n\n<p>Start OpenVAS<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>\/usr\/bin\/python3 \/opt\/gvm\/bin\/ospd-openvas \\\n--pid-file \/opt\/gvm\/var\/run\/ospd-openvas.pid \\\n--log-file \/opt\/gvm\/var\/log\/gvm\/ospd-openvas.log \\\n--lock-file-dir \/opt\/gvm\/var\/run -u <strong>\/opt\/gvm\/var\/run\/ospd.sock<\/strong><\/code><\/pre>\n\n\n\n<p>Start GVM<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>gvmd --osp-vt-update=<strong>\/opt\/gvm\/var\/run\/ospd.sock<\/strong><\/code><\/pre>\n\n\n\n<p>Start GSA<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo gsad<\/code><\/pre>\n\n\n\n<p>Consider creating systemd service unit files for  these services to enable you manage them easily. See below<\/p>\n\n\n\n<p>Check the status;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>ps aux | grep -E \"ospd-openvas|gsad|gvmd\" | grep -v grep<\/code><\/pre>\n\n\n\n<p>Sample output;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>gvm         8221  0.0  0.0  81196  1436 ?        Ss   10:47   0:00 gpg-agent --homedir \/opt\/gvm\/var\/lib\/gvm\/gvmd\/gnupg --use-standard-socket --daemon\ngvm         8475  2.0  6.0 382248 122184 pts\/0   Sl   10:54   1:23 \/usr\/bin\/python3 \/opt\/gvm\/bin\/ospd-openvas --pid-file \/opt\/gvm\/var\/run\/ospd-openvas.pid --log-file \/opt\/gvm\/var\/log\/gvm\/ospd-openvas.log --lock-file-dir \/opt\/gvm\/var\/run -u \/opt\/gvm\/var\/run\/ospd.sock\ngvm         8523  0.1 10.1 295648 206108 pts\/0   S    10:57   0:06 gvmd: Waiting for incoming connections\npostgres    8541  0.1  7.7 225436 157888 ?       SLs  10:57   0:05 postgres: 12\/main: gvm gvmd &#91;local] idle\nroot        8599  0.0  0.8 664696 17064 pts\/0    Sl   10:58   0:00 gsad\nroot        8600  0.0  0.1 205912  3608 pts\/0    Sl   10:58   0:00 gsad\ngvm        11911  0.0  9.7 295648 198056 pts\/0   S    12:01   0:00 gvmd: Reloading NVTs\ngvm        11913  0.0  9.8 295648 201172 pts\/0   S    12:01   0:00 gvmd: OSP: Updating NVT cache\npostgres   11917  0.1  0.9 217796 19544 ?        Ss   12:01   0:00 postgres: 12\/main: gvm gvmd &#91;local] idle<\/code><\/pre>\n\n\n\n<p>You can also find the logs at, <code><strong>&lt;install-prefix&gt;\/var\/log\/gvm\/<\/strong><\/code>, which in this case is <strong><code>\/opt\/gvm\/var\/log\/gvm<\/code><\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"create-gvm11-systemd-services\"><a href=\"#create-gvm11-systemd-services\">Creating Systemd Service units for GVM services<\/a><\/h3>\n\n\n\n<p>The services below are based on what <a href=\"https:\/\/github.com\/yu210148\/gvm_install\" target=\"_blank\" rel=\"noreferrer noopener\">Kevin<\/a> (in the comments section) did on his script.<\/p>\n\n\n\n<p>If you had run the services commands above, be sure to stop them before you can rerun using systemd.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-gvm-11-openvas-service\"><a href=\"#create-gvm-11-openvas-service\">Create OpenVAS service<\/a><\/h4>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/systemd\/system\/openvas.service<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Unit]\nDescription=Control the OpenVAS service\nAfter=redis.service\nAfter=postgresql.service\n\n&#91;Service]\nExecStartPre=-rm -rf \/opt\/gvm\/var\/run\/ospd-openvas.pid \/opt\/gvm\/var\/run\/ospd.sock \/opt\/gvm\/var\/run\/gvmd.sock\nType=simple\nUser=gvm\nGroup=gvm\nEnvironment=PATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin:\/usr\/games:\/usr\/local\/games:\/opt\/gvm\/bin:\/opt\/gvm\/sbin:\/opt\/gvm\/.local\/bin\nEnvironment=PYTHONPATH=\/opt\/gvm\/lib\/python3.8\/site-packages\nExecStart=\/usr\/bin\/python3 \/opt\/gvm\/bin\/ospd-openvas \\\n--pid-file \/opt\/gvm\/var\/run\/ospd-openvas.pid \\\n--log-file \/opt\/gvm\/var\/log\/gvm\/ospd-openvas.log \\\n--lock-file-dir \/opt\/gvm\/var\/run -u \/opt\/gvm\/var\/run\/ospd.sock\nRemainAfterExit=yes\n\n&#91;Install]\nWantedBy=multi-user.target<\/code><\/pre>\n\n\n\n<p>Save and exit the file and start OpenVas.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl daemon-reload<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl start openvas<\/code><\/pre>\n\n\n\n<p>Check the status of the service;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl status openvas<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\u25cf openvas.service - Control the OpenVAS service\n     Loaded: loaded (\/etc\/systemd\/system\/openvas.service; disabled; vendor preset: enabled)\n     Active: active (exited) since Fri 2020-08-28 05:16:50 UTC; 4s ago\n    Process: 27483 ExecStartPre=\/usr\/bin\/rm -rf \/opt\/gvm\/var\/run\/ospd-openvas.pid \/opt\/gvm\/var\/run\/ospd.sock \/opt\/gvm\/var\/run\/gvmd.sock (code=exited, status=0\/SUCCESS)\n    Process: 27484 ExecStart=\/usr\/bin\/python3 \/opt\/gvm\/bin\/ospd-openvas --pid-file \/opt\/gvm\/var\/run\/ospd-openvas.pid --log-file \/opt\/gvm\/var\/log\/gvm\/ospd-openvas.log --loc&gt;\n   Main PID: 27484 (code=exited, status=0\/SUCCESS)\n      Tasks: 1 (limit: 2282)\n     Memory: 42.8M\n     CGroup: \/system.slice\/openvas.service\n             \u2514\u250027501 \/usr\/bin\/python3 \/opt\/gvm\/bin\/ospd-openvas --pid-file \/opt\/gvm\/var\/run\/ospd-openvas.pid --log-file \/opt\/gvm\/var\/log\/gvm\/ospd-openvas.log --lock-file-d&gt;\n\nAug 28 05:16:50 ubuntu20 systemd&#91;1]: Starting Control the OpenVAS service...\nAug 28 05:16:50 ubuntu20 systemd&#91;1]: Started Control the OpenVAS service.<\/code><\/pre>\n\n\n\n<p>Enable OpenVAS scanner to run on system boot;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>systemctl enable openvas<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-gsa-service-unit-file\"><a href=\"#create-gsa-service-unit-file\">Create GSA Service Unit file<\/a><\/h4>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/systemd\/system\/gsa.service<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Unit]\nDescription=Control the OpenVAS GSA service\nAfter=openvas.service\n\n&#91;Service]\nType=simple\nUser=gvm\nGroup=gvm\nEnvironment=PATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin:\/usr\/games:\/usr\/local\/games:\/opt\/gvm\/bin:\/opt\/gvm\/sbin:\/opt\/gvm\/.local\/bin\nEnvironment=PYTHONPATH=\/opt\/gvm\/lib\/python3.8\/site-packages\nExecStart=\/usr\/bin\/sudo \/opt\/gvm\/sbin\/gsad\nRemainAfterExit=yes\n\n&#91;Install]\nWantedBy=multi-user.target<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/systemd\/system\/gsa.path<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Unit]\nDescription=Start the OpenVAS GSA service when gvmd.sock is available\n\n&#91;Path]\nPathChanged=\/opt\/gvm\/var\/run\/gvmd.sock\nUnit=gsa.service\n\n&#91;Install]\nWantedBy=multi-user.target<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-gvm-service-unit-file\"><a href=\"#create-gvm-service-unit-file\">Create GVM Service unit file<\/a><\/h4>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/systemd\/system\/gvm.service<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Unit]\nDescription=Control the OpenVAS GVM service\nAfter=openvas.service\n\n&#91;Service]\nType=simple\nUser=gvm\nGroup=gvm\nEnvironment=PATH=\/usr\/local\/sbin:\/usr\/local\/bin:\/usr\/sbin:\/usr\/bin:\/sbin:\/bin:\/usr\/games:\/usr\/local\/games:\/opt\/gvm\/bin:\/opt\/gvm\/sbin:\/opt\/gvm\/.local\/bin\nEnvironment=PYTHONPATH=\/opt\/gvm\/lib\/python3.8\/site-packages\nExecStart=\/opt\/gvm\/sbin\/gvmd --osp-vt-update=\/opt\/gvm\/var\/run\/ospd.sock\nRemainAfterExit=yes\n\n&#91;Install]\nWantedBy=multi-user.target<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>vim \/etc\/systemd\/system\/gvm.path<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;Unit]\nDescription=Start the OpenVAS GVM service when opsd.sock is available\n\n&#91;Path]\nPathChanged=\/opt\/gvm\/var\/run\/ospd.sock\nUnit=gvm.service\n\n&#91;Install]\nWantedBy=multi-user.target<\/code><\/pre>\n\n\n\n<p>Reload system unit configs and start the services;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>systemctl daemon-reload\nsystemctl enable --now gvm.{path,service}\nsystemctl enable --now gsa.{path,service}<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\">Create GVM Scanner<\/h4>\n\n\n\n<p>Since we launched the scanner and set it to use our non-standard scanner host path (<strong>\/opt\/gvm\/var\/run\/ospd.sock<\/strong>), we need to create and register our scanner;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo -Hiu gvm gvmd --create-scanner=\"Kifarunix-demo OpenVAS Scanner\" --scanner-type=\"OpenVAS\" --scanner-host=\/opt\/gvm\/var\/run\/ospd.sock<\/code><\/pre>\n\n\n\n<p>Next, you need to verify your scanner. For this, you first need to get the scanner identifier;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo -Hiu gvm gvmd --get-scanners<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>08b69003-5fc2-4037-a479-93b440211c73 OpenVAS \/tmp\/ospd.sock 0 OpenVAS Default\n6acd0832-df90-11e4-b9d5-28d24461215b CVE 0 CVE\n<strong>9c6f2214-eb7c-4613-96bd-21551b259cf1<\/strong> OpenVAS \/opt\/gvm\/var\/run\/ospd.sock 9390 Kifarunix-demo OpenVAS Scanner<\/code><\/pre>\n\n\n\n<p>Based on the output above, our scanner UUID is, <strong><code>9c6f2214-eb7c-4613-96bd-21551b259cf1<\/code><\/strong>.<\/p>\n\n\n\n<p>Verify the scanner;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo -Hiu gvm gvmd --verify-scanner=<strong>9c6f2214-eb7c-4613-96bd-21551b259cf1<\/strong><\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-gvm11-admin-user\"><a href=\"#create-gvm11-admin-user\">Create OpenVAS (GVM 11) Admin User<\/a><\/h4>\n\n\n\n<p>Create OpenVAS administrative user by running the command below;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo -Hiu gvm gvmd --create-user gvmadmin<\/code><\/pre>\n\n\n\n<p>This command generates a random password for the user.<\/p>\n\n\n\n<p>If you want to create a user and at the same time create your own password;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo -Hiu gvm gvmd --create-user gvmadmin --password=StronGP@SS<\/code><\/pre>\n\n\n\n<p>Otherwise, you can reset the password of an already existing user;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>sudo -Hiu gvm gvmd --user=&lt;USERNAME&gt; --new-password=&lt;PASSWORD&gt;<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\">Accessing GVM 11 (OpenVAS)<\/h3>\n\n\n\n<p>Greenbone Security Assistant (GSA) WebUI daemon opens port 443 and listens on all interfaces. If firewall is running, open this port to allow external access.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>ufw allow 443\/tcp<\/code><\/pre>\n\n\n\n<p>You can now access GSA via the url <code>https:&lt;serverIP-OR-hostname&gt;<\/code>. Accept the self-signed SSL warning and proceed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1212\" height=\"539\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm11-login.png\" alt=\"Install and Setup GVM 11 on Ubuntu 20.04\" class=\"wp-image-5587\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm11-login.png?v=1587902238 1212w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm11-login-768x342.png?v=1587902238 768w\" sizes=\"(max-width: 1212px) 100vw, 1212px\" \/><\/figure>\n\n\n\n<p>Login with the administrative credentials generated above.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1351\" height=\"653\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm11-webui.png\" alt=\"\" class=\"wp-image-5588\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm11-webui.png?v=1587902262 1351w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm11-webui-768x371.png?v=1587902262 768w\" sizes=\"(max-width: 1351px) 100vw, 1351px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1349\" height=\"638\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm-11-secinfo.png\" alt=\"\" class=\"wp-image-5589\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm-11-secinfo.png?v=1587902918 1349w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/04\/gvm-11-secinfo-768x363.png?v=1587902918 768w\" sizes=\"(max-width: 1349px) 100vw, 1349px\" \/><\/figure>\n\n\n\n<p>And there you go. That is all it take to install and Setup GVM 11. You can now start running your scans.<\/p>\n\n\n\n<p><strong>NOTE<\/strong>: When creating a scan task, be sure to select the Scanner we created above.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1215\" height=\"671\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/08\/scanner.png\" alt=\"\" class=\"wp-image-6845\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/08\/scanner.png?v=1598636617 1215w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/08\/scanner-768x424.png?v=1598636617 768w\" sizes=\"(max-width: 1215px) 100vw, 1215px\" \/><\/figure>\n\n\n\n<p>See example scan report below for Windows 7.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1911\" height=\"731\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/scan-report-windows-7.png\" alt=\"\" class=\"wp-image-5945\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/scan-report-windows-7.png?v=1590765992 1911w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/scan-report-windows-7-768x294.png?v=1590765992 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/scan-report-windows-7-1536x588.png?v=1590765992 1536w\" sizes=\"(max-width: 1911px) 100vw, 1911px\" \/><\/figure>\n\n\n\n<p>Vulnerability report;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1917\" height=\"916\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/vulnerability-report-windows-7.png\" alt=\"\" class=\"wp-image-5946\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/vulnerability-report-windows-7.png?v=1590766064 1917w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/vulnerability-report-windows-7-768x367.png?v=1590766064 768w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/05\/vulnerability-report-windows-7-1536x734.png?v=1590766064 1536w\" sizes=\"(max-width: 1917px) 100vw, 1917px\" \/><\/figure>\n\n\n\n<p>Did I miss anything, drop it in the comments section!! Enjoy<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reference<\/h3>\n\n\n\n<p>Source files <strong>README.md <\/strong>and <strong>INSTALL.md<\/strong> files<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Related Tutorials<\/h3>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/install-openvas-10-gvm-on-debian-10-buster\/\" target=\"_blank\" rel=\"noreferrer noopener\">Install OpenVAS 10 (GVM) on Debian 10 Buster<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/kifarunix.com\/install-openvas-9-with-postgresql-in-ubuntu-18-04\/\" target=\"_blank\">Install OpenVAS 9 with PostgreSQL in Ubuntu 18.04<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/kifarunix.com\/how-to-add-and-scan-a-target-for-vulnerabilities-on-openvas\/\" target=\"_blank\">How to Add and Scan a Target for Vulnerabilities on OpenVAS Scanner<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/kifarunix.com\/how-to-install-and-setup-openvas-9-vulnerability-scanner-on-ubuntu-18-04\/\" target=\"_blank\">How to Install and Setup OpenVAS 9 Vulnerability Scanner on Ubuntu 18.04<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/install-use-wpscan-wordpress-vulnerability-scanner-ubuntu-18-04\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Install and Use WPScan WordPress Vulnerability Scanner Ubuntu 18.04<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this guide, we are going to learn how to install and setup GVM 11 on Ubuntu 20.04. Greenbone&nbsp;Vulnerability&nbsp;Management (GVM), was previously known as OpenVAS,<\/p>\n","protected":false},"author":1,"featured_media":7900,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[121,370,34,150],"tags":[1482,1483,1481,1485,1484,1480],"class_list":["post-5570","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-howtos","category-openvas","category-security","category-vulnerability-scanners","tag-gvm-11","tag-gvm-11-ubuntu-20-04","tag-gvm-openvas-ubuntu-20-04","tag-install-gvm-11-ubuntu-20-04","tag-install-openvas-ubuntu-20-04","tag-openvas-11","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/5570"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=5570"}],"version-history":[{"count":37,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/5570\/revisions"}],"predecessor-version":[{"id":21358,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/5570\/revisions\/21358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/7900"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=5570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=5570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=5570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}