
We’ll discuss the two most popular methods before proceeding with the installation. There are multiple methods for installing OpenVAS/GVM. While pentesters and people doing bug bounties can use it as well, other available tools may be preferable, geared toward their areas of expertise. In most scenarios it would be used by people in a “ blue team” environment. OpenVAS/GVM is useful for companies’ DevOps/security teams. Has an internal programming language that can be used for implementing custom vulnerability tests.Supports a variety of high- and low-level Internet and industrial protocols.Can perform various types of authenticated/unauthenticated tests.Is backed by an enterprise software-security company.Has a long history (since 2009) with daily updates and over 50,000 vulnerability tests.Here are some notable positives of OpenVAS/GVM: With its focus on the enterprise market and its long history, any risks of enterprises adopting a technology that might become abandoned are greatly reduced. OpenVAS dates back to 2009 and the project is maintained by a commercial/open-source company. OpenVAS/GVM is a fully-featured vulnerability scanner, but it’s also one component of the larger “Greenbone Security Manager” (GSM). In this post we’ll refer to OpenVAS/GVM interchangeably, as the old name is still used to identify the software. One such product is OpenVAS (now renamed Greenbone Vulnerability Management or GVM). The enterprise/proprietary vulnerability scanner market is filled with competitors (such as QualysGuard or Nessus), and while some companies prefer running proprietary enterprise scanners, there are also many companies that prefer using collective intelligence and open source scanners. Vulnerability scanners, in particular, are critical for ensuring that any threats that may have made it past the firewall are picked up before they can infect and destroy entire networks. Performing an advanced vulnerability scan.
