20159217cbs 原文
OpenVAS应用实例
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324205448120-1282068833.png)
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324205657167-2022645831.png)
输入用户名和密码访问本地https://localhost:9392/登录OpenVAS的WEB管理界面(注意此时如果是重启的电脑需要在命令行下输入openvas-setup)
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324205817448-1498435869.png)
点击Configuration的Target菜单,选择New Target,按照如下配置
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324210048667-1093328578.png)
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324210115620-1204485194.png)
之后点击Scan Management中的new task建立下图所示任务
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324224918120-1878459812.png)
建立后显示在主页面上,开始扫描漏洞
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324225011604-713446686.png)
可以点击查看详细信息查看当前进程
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324225150433-321984655.png)
刷新进程,直到其完成,查看高危漏洞详细信息
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324225430604-449521760.png)
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324225459854-64100314.png)
可以下载pdf版报告,如下图
![](https://images2015.cnblogs.com/blog/816775/201603/816775-20160324225600604-1044244059.png)
推荐阅读