Thank god you do not have to compile OpenVas from source on Debian Buster like I have to do in prior Debian releases. Today we will go step by step on all of the steps needed to get OpenVas up and running.
As always, first things first, let us update APT.
Installing our binaries is as simple as this now, there are lots of dependencies but Debian 10 seems to have all of them in the repositories.
Running setup should do any further downloading of external files and compiling.
Notice at the end of the setup that your admin password is given. Copy it down before you lose it! Change it immediately after logging in.
Optional: Change Listening IP Address
If you need access to your scanner outside of the setup machine, follow these steps to change the listening address. Change external_ip to your ip address. Now I did try 0.0.0.0 but picked up header errors, this change did work though.
You should now be able to navigate to your external ip address and port to get to your login screen. Your default login credentials are UserName:admin and the password is the one you received earlier from the setup script.
To change your password, the menu to the far right administration->users
Automatically Update Feeds with Crontab
We can update our database every night to make sure we have up to date feeds of vulnerabilities. To do this we will just make a bash script and run it at 1am every night.
Now add it to your crontab -e
If during a long scanning process the web interface starts timing out an adjustment can be made, listed here.
An internal error occurred. Diagnostics: Could not authenticate to manager daemon.
And add this code to the end.
Now restart your services.