index.html   posts.html   about.html   contact.html   .secret.html

---

Exploring OpenVAS and Diving into File Transfers

January 21, 2025


Blog Image

Over the past couple of weeks, I’ve wrapped up the Vulnerability Assessment module and explored OpenVAS, an entirely new tool for me. Diving into this tool has been a refreshing addition to my skill set. As I continue my penetration testing journey, I’ve also started a new module focused on file transfers, an essential aspect of assessments. It’s been exciting to combine the technical and practical knowledge I’ve gained so far.



Getting Started with OpenVAS

OpenVAS has been one of the most intriguing tools I’ve encountered recently. Compared to other vulnerability scanners like Nessus, OpenVAS is open-source, and its ability to integrate with other tools makes it a flexible choice for security professionals. During this module, I explored its setup, scan configuration, and result export process. Understanding the key aspects of OpenVAS has given me a deeper appreciation for its role in identifying and managing vulnerabilities.

One standout feature was the detailed reporting. The ability to group vulnerabilities by severity, along with actionable remediation steps, stood out as an example of how to deliver meaningful insights to both technical teams and executives.

Starting the File Transfers Module

File transfers are a fundamental part of penetration testing, and starting this module helped me understand the numerous methods and challenges involved. One key takeaway is the importance of adaptability; different environments may have varying levels of restrictions. For instance, while tools like PowerShell and Certutil are common, they can be blocked in highly secure environments. This module emphasized creative solutions, such as setting up an SMB server or using HTTP/S, to bypass restrictions.

The module also highlighted the significance of understanding network-level defenses like firewalls and intrusion detection systems (IDS). This insight reinforced the need to tailor file transfer techniques to each specific situation.

Wrapping Up

With these modules, I’ve gained a well-rounded perspective on vulnerability assessments and the practicalities of file transfers. Each module adds a layer of depth to my skill set, preparing me for real-world scenarios. I’m looking forward to continuing this journey and tackling more complex challenges.





"To know vulnerabilities, you must first understand the tools that reveal them." – Unknown


  • /posts
  • ├── Recent_Posts
  • │ ├── Diving Into the UnderPass Machine: A Penetration Testing Walkthrough
  • │ ├── Cracking Open the Netmon Machine: A Penetration Testing Walkthrough
  • │ ├── Exploring OpenVAS and Diving into File Transfers

---

$ ~