Vulnerability Scanner Pi  

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

Teacher Overview

‘Kali Linux’, is an operating system (OS) which has been created specifically for ethical hacking and digital forensics. It is loaded with numerous of tools: such as nmap, Metasploit that can be applied to many situations and currently is one of the most popular OS for cyber security specialists. There are other OS made for penetration testing such as Parrot OS and Black Arch but generally it is easier to access Kali Linux than these alternatives.

A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for known weaknesses. In plain words, these scanners are used to discover the weak points or poorly constructed parts of the scanned system. It is used for the identification and detection of vulnerabilities relating to mis-configured assets or flawed software that resides on a network-based asset such as a firewall, router, web server, application server, etc.

Modern vulnerability scanners will allow for both authenticated and unauthenticated scans to occur. Modern scanners are typically available as SaaS (Software as a Service) by providers over the Internet as a web application and the amount of host information is vast. The modern vulnerability scanner has the capabilities to customise vulnerability reports, installed software, open ports, certificates and much other host information that can be queried by users to increase network security.

OpenVAS (Open Vulnerability Assessment System, originally known as GNessUs) is a software framework of several services and tools offering vulnerability scanning and vulnerability management. OpenVAS began under the name of GNessUs, as a fork of the previously open source Nessus scanning tool, after its developers Tenable Network Security changed it to a proprietary (closed source) license in October 2005. OpenVAS was originally proposed by pentesters at SecuritySpace, discussed with pentesters at Portcullis Computer Security and then announced by Tim Brown on Slashdot.

In this project the students will be scanning a network using OpenVAS to look for vulnerabilities. Then they will look at how they are displayed in OpenVAS, going into more detail and looking at specific vulnerabilities that are on their machines. You can also do further research on each of the vulnerabilities they find.

Suggested Year Group

The suggested age group is 16+, due to the nature of this project and the skills it is developing.

 

Learning Objectives

1.    Understand the basic principles of OpenVAS;

2.    Learn about the benefits of using OpenVAS;

3.    Run OpenVAS on Kali Linux on the Raspberry Pi and use it to scan the network for vulnerabilities.

 

Component Number (Peli Case)

(Base) 4 + 5

(Base) 5

(Base) 9

(Level 1) 3

(Level 1) 3

(Level 1) 5

(Level 1) 1

 

Component Number (Box Case)

Slot 1

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

 

Component

Raspberry Pi + Case

Kali Linux SD Card

TFT Screen

HDMI

Wireless Keyboard

Wireless Mouse

Power Supply Unit

 

VIDEO GUIDE

 

Conclusion

This project is designed to introduce students to OpenVAS and the applications this technology has in IT. The students would have used OpenVAS on the Raspberry Pi to scan their machine for vulnerabilities, and then would have looked into the different results found and then taken that data and filtered it to research additional methods to mitigate the problems. OpenVAS is an extremely handy tool, and this tutorial is just scratching the surface of what you can do with it. There is so much more you can do with the software, and further research is encouraged to learn more about its capabilities. Keep in mind that the Raspberry Pi is limited in processing power and will not be able to handle large volumes of information.