How can I conduct a vulnerability scan of my network using OpenVAS?

Learn how you can use OpenVAS to scan your network for hosts and fingerprint their listening services to obtain access.

By Chad Russell
April 27, 2017
Screen from "How can I conduct a vulnerability scan of my network using OpenVAS?" Screen from "How can I conduct a vulnerability scan of my network using OpenVAS?" (source: O'Reilly)

Scanning for vulnerabilities is the first step for both securing and attacking a network. In this video, Chad Russell demonstrates how OpenVAS can be used to scan your network for hosts and fingerprint their listening services to obtain access. All that is needed to follow along is access to a Linux operating system and a basic knowledge of the command line. System administrators and security engineers will be able to use this information proactively to patch and secure their networks before attackers exploit weaknesses.

Grow your ethical hacking skills with the full Certified Ethical Hacker course—exclusive in Safari.

Learn faster. Dig deeper. See farther.

Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

Learn more


Chad Russell is a cyber security veteran of 15 years who has held CISSP, CCNP, MCSE, and MCDBA certifications. Chad has taught Microsoft Engineering courses as a certified trainer, and has acted as a security engineering consultant for companies such as SAP, Microsoft, and Oracle. Currently, Chad conducts security risk assessments for companies throughout North America with an emphasis on cloud security, identity governances, network security, social engineering, mobile security, breach assessments, database security, and access management.

Post topics: Security
Post tags: Questions
Share: