I have used it on CentOS 6.3. This is how we loaded it. Step 1: Configure Atomicorp Repository sudo -i export NON_INT=Y; wget -q -O - http://www.atomicorp.com/installers/atomic | sh Step 2: Quick-Install OpenVAS yum -y --disablerepo=\* --enablerepo=base,updates,atomic,rpmforge install openvas gsd openvas-setup openvas-certdata-sync service openvas-scanner start openvasmd --rebuild service openvas-manager start service gsad start During the openvas-setup you will prompted to create a user/login. -- no rules are needed. The above step can take quite a while depending on the speed of your connection as all the current security vulnerabilities are being downloaded. Open https://localhost:9392/ or start "gsd" on a command line as a regular user (not as root!) The first thing to do is create a target under Configuration menu then create a Scan Task and then start the scan task. Refresh your browser to track the progress of the scan. On 09/12/2013 09:20 AM, Fabrizio Di Carlo wrote: > I downloaded last week OpenVAS but I don't know if I made some mistake or > no... By the way the project is really interesting so if someone has some > tips about installation and configuration I will be happy to read. > > Fabrizio > > > On Thu, Sep 12, 2013 at 3:11 PM, Patrick Bervoets < > patrick.bervoets@xxxxxxxxxxxxx> wrote: > >> I was looking for a vulnerability scanner and found OpenVAS. Does anyone >> has experiences with that scanner? >> And with the Atomicorp repository? (the OpenVAS website refers to that >> repo) >> >> Thanks >> Patrick >> >> >> _______________________________________________ >> CentOS mailing list >> CentOS@xxxxxxxxxx >> http://lists.centos.org/mailman/listinfo/centos >> >> > -- Stephen Clark *NetWolves* Director of Technology Phone: 813-579-3200 Fax: 813-882-0209 Email: steve.clark@xxxxxxxxxxxxx http://www.netwolves.com _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos