openvassd
The openvassd command is the daemon process for OpenVAS (Open Vulnerability Assessment System). This daemon handles the actual scanning tasks, managing the execution of Network Vulnerability Tests (NVTs). It listens for scan requests, executes the scans, and returns the results.
Basic Usage
To start the openvassd daemon, you can use the following command:
sudo openvassdThis command starts the OpenVAS Scanner daemon, which will begin listening for scan requests.
Common Usage and Options
Start Daemon:
sudo openvassdConfiguration File: You can specify a custom configuration file using the
-coption:sudo openvassd -c /path/to/custom/openvassd.confLog File: To specify a log file for
openvassd, use the-loption:sudo openvassd -l /var/log/openvas/openvassd.logVerbose Output: For more detailed output, you can run
openvassdin verbose mode with the-voption:sudo openvassd -vHelp: To see a list of available options and usage information, use the
-hoption:openvassd -h
Example
Here’s an example of starting openvassd with a custom configuration file and logging to a specific file:
Configuration File
The default configuration file for openvassd is typically located at /etc/openvas/openvassd.conf. This file includes various settings that control the behavior of the OpenVAS Scanner daemon.
Example contents of openvassd.conf:
Managing the Daemon
On systems with systemd, you can manage the openvassd service with the following commands:
Start the service:
Stop the service:
Enable the service to start on boot:
Check the status of the service:
Security Considerations
Access Control: Ensure that only authorized users can start and stop the
openvassddaemon.Secure Configuration: Regularly review the configuration file and ensure it adheres to your security policies.
Log Monitoring: Regularly monitor the log files for any suspicious activity or errors.
Conclusion
The openvassd daemon is a core component of the OpenVAS framework, responsible for executing vulnerability scans. Understanding how to configure, start, and manage openvassd is crucial for maintaining an effective vulnerability assessment system. By keeping the daemon properly configured and up to date, you ensure that your network scans are reliable and secure.
Last updated