How to Install and Configure OpenVAS: Setup guide


OpenVAS stands for Open Vulnerability Assessment System. It is the collection of several tools and services which offers vulnerability scanning and management solution. OpenVAS is free and it is licensed under GPL (GNU General Public License).

Lets start with the step by step guide on installing and configuring the OpenVAS in linux machine. Here we prefer backtrack to configure the OpenVAS.
Open the Terminal and install openvas by typing the bellow command.
apt-get install openvas

After install perform the registry update with the bellow mentioned command.
apt-get update

After installing OpenVAS you’ll find it installed at the Application menu on top.
The Exact location is the Application – Backtrack – VA – VS – OpenVAS

After that click on openvas Check Setup. It will check for problems with installation and provides effective solutions for it.

add user and set rule if required. also set the password for user.

Now click on  OpenVAS NVT Sync to synchronize an NVT collection with OpenVAS NVT feed. It’ll download latest plugins from NVT. Now start OpenVAS Scanner and it’ll loads the required plugins.

Now open the OpenVAS Mkcert to create the SSL certificate.

Type the bellow command to setup the manager

openvas-mkcert-client -n ovmgr -i

type openvasmd –rebuild to changes to be effective.

To create OpenVAS admin start OpenVAS Administrator and type the bellow mentioned command

openvasad -c ‘add_user’ -n openvasadmin -r Admin

For Setting openvas manager port and address type the bellow mentioned command

openvasmd -p 9390 -a

Set the Openvas Administrator address and port as bellow

openvasad -p 9393 -a

Now to configure and start the greenbone security demon type the command
gsad –http-only –listen= -p 9392

Now you are done and you can access the Greenbone Security Assistant from the browser by typing the url and give your username and password.

Thanks for reading. Comment below to state your views.

Transfer File between Windows and Linux Machine using SCP


You can transfer files from one PC to another but you requires removable storage device. Some of us already knows the ways to transfer the files between two different machines without removable devices but its new for many of us. You can copy files between two Linux machines by using SCP. But if you are dealing with two different operating systems and you need it more frequently to share files between two distinct Os like, one windows and another is Linux or Unix, You requires some advanced steps because windows doesn’t knows the command which Linux knows. To do that just follow the brief steps.

Turn on two machines: 1 Linux and another Windows.
Ping both machines well. It is the first step before doing anything else. Assign the Ip address to both the machines and with the same network.

Assigning IPs:

Ex. Machine 1 Ip : (Linux)
Machine 2 Ip: (Windows)

Use ifconfig command for linux and ipconfig for windows machine to check the ip-address.
set the Ip-address for linux: open Terminal in linux and type ifconfig to check the Interface if it is eth0 or eth1.
Use below command to set ip address in linux.
ifconfig eth0 Ip

Where, eth0- Ethernet Interface.
Ip- Address which you want to assign.

For Windows Move to the Network connections and assign the Ip address to local network by right clicking it and properties.

Ping Both Machine:

Now both the machines are in same network. Now Try to ping both the PCs and check if it pings well. If there is the pinging issue then check for firewall and turnoff the firewall inside the windows. Hopefully it pings now.

Start Secured Shell Service:

Now turn on the ssh (secured shell) service in Linux machine by typing command service ssh start in terminal. You can check the status of service as well by typing the command service ssh status.
After doing that just install the WinSCP client inside the windows machine. Download it from Set the remote machine Ip address to connect as follow.

SCP login


Select the Protocol, Add remote machine Ip, Enter Username and password of remote machine also. Now press login and You are done! You are connected to the Linux as below and now you can transfer the files between windows and linux.
This is especially for the user who interacts most frequently with both the windows and linux machines.

Thanks and raise your issues in comment.

Sticky bits Permission in Linux systems: How To


For windows we are using creator-owner permissions same we are using here with Linux kernel. Sticky bits is the important for the Linux kernels as you are going to share the folder for all the users. If you share single directory for all the users then the problem with that is, any user can view the contents of other user’s file and can modify it easily or he/she can also delete the shared folder or contents of other users.
To overcome that problem we are going to use sticky bit. Sticky bit is just the giving edit/delete permissions to specific users on shared folder. As we are going to apply it on Linux kernel you should very handy over the terminal.

First we need to add the users as bellow.
# useradd Alice
# passwd Alice
# su Alice
# ls  -all
: Permission denied
# su – Alice
# ls -all
:Permission granted
We are sated the new user Alice and also gave password for that user.

Now add another user Bob as above.
Here Alice and Bob can create files on their own folder ”/home/Alice” or   ”/home/Bob” only.
Now make directory which is open for all the users named /OpenData (Open for all the users).
# mkdir /OpenData
Now next step is to give permissions to that directory.
# chmod o+w /OpenData
Here ‘+’ denotes Adding Permission
-‘ denotes Removing Permission
‘o+w’ means giving write permissions to others.

Now Alice and Bob can create files in OpenData directory.

Now one more concept is inherited attribute comes into the picture as we are giving write permission it allows all the users in folder to access file and modify file. Even Bob have -r file permission he can modify it.
now to apply edit/delete permissions to specific users on shared folder we use Sticky bit support.
# chmod +t /OpenData
By means of it users who have created the file can only modify/delete the file and no others are allowed to modify or delete the file.
File or directory which are created by Alice under the OpenData are not accessible to Bob and Viceversa.

Enjoy the Linux Kernel configurations !

Keylogger For Linux Computer systems: Installation commands


Most of us familiar with the key logger tool of windows environment.
But if you are familiar with the Linux platform which is more relies on the commands than refer the way bellow to install and monitor each and every key records on keyboard.

LKL is the linux based keylogger which never crash your X.
It is the program which run on terminal and by means of that every keyboard keys get recorded.
You can easily find the LKL keylogger into the software center of the linux operating system.To start logging the keyboard activity of the user open up the Terminal in Linux machine and than change directory and locate it to the installed lkl keylogger directory.
Now as you successfully moved to the lkl directory type the ls command to view the contents of the keylogger.

If you have downloaded the lkl keylogger manually than it needs to be configured. To configure it follow the bellow steps.

locate to the lkl directory.and type the bellow commands
make install

Now to start being record just type the command bellow

sudo lkl -l -k keymaps/it_km -o log.file

here the keystrokes are recorded into the log.file of the lkl directory. If you wish to record it to the another file than specify the path of that file.

Now each keystrokes being recorded inside the specified file.

Feels free to ask or comment bellow.

SSH and SCP from local to remote machine without password

I am going to explain easiest and more common way to perform SSH and SCP from local to remote machine without password authentication
Following steps explains how to perform SSH and SCP from local-host to a remote-host without entering the password on openSSH system
1. Verify that local-host and remote-host is running openSSH
On the terminal of both local and remote machine by using ssh -V command you can verify it..!!


2. Generate key-pair on the local-host using ssh-keygen

The public key and private key are typically stored in .ssh folder under your home directory.
By default the ssh-keygen on openSSH generates RSA key pair. You can also generate DSA key pair using: ssh-keygen -t dsa command.

3. Install public key on the remote-host.
Copy the content of the public key from the local-host and paste it to the .ssh/authorized_keys on the remote-host. If the .ssh/authorized_keys already has some other public key, you can append this to the end of it.


4. Give appropriate permission to the .ssh directory on the remote-host.

5. Start the SSH Agent on local-host to perform ssh and scp without having to enter the pass-phrase several times.
Load the private key to the SSH agent on the local-host by using ssh-add.
6. Perform SSH or SCP from local-host to remote-host without entering the password.


Here remote machine having ip and by typing above command you can get the remote machine shell without password authentication.
you can also copy the files from local-host to remote host by using scp as mentioned below.
Please leave your comments and feedback regarding this article.
Subscribe with us to get updated with daily news.

Also Know PGP and GPG Secure Data Communication on two Linux machine

Thank you.