For instructions on how to install Docker on Ubuntu see my post here: https://www.cb-net.co.uk/linux/installing-docker-on-ubuntu-16-04-lts-16-10/
Updated 31/05/17 to include Ping Host and NMAP (NASL wrapper) tests due to feedback around reliability of results without these tests enabled.
Following on from my previous post around MS17-010 / 4013389 vulnerability patching assurance I thought I’d share a more robust scanning and reporting tool that is simple to deploy and use, OpenVAS. The deployment/ configuration of which is made even simpler through the availability of a Docker Image.
Assuming you have an Ubuntu 16.04 server/ client with the docker engine installed, use the following commands to get OpenVas up and running:
docker pull mikesplain/openvas:9
docker run -d -p 443:443 --name openvas mikesplain/openvas:9
# *** Alternatively *** use the host machines IP address rather than the docker0 interface/ a NAT'd address as above.
docker run -d --net host -p 443:443 --name openvas mikesplain/openvas:9
Next, browse to https://<machine IP> and login, using default credentials of admin / admin :
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image002.jpg)
Now, from the top menu, browse to Configuration > Scan Configs
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image004-300x27.jpg)
Click the “sheep” (clone) button next to empty
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image006-300x101.jpg)
Hit the spanner icon at the top of the window:
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image008.jpg)
Name the Scan Config “MS17-010 Vulnerability Check” or something else meaningful:
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image010-300x181.jpg)
Scroll down to “Windows : Microsoft Bulletins” and hit the spanner icon next to this:
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image012-300x182.jpg)
Search for 4013389 (the relevant MS ID), enable all instances for the scan and click save:
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image014-300x181.jpg)
As per comments via this post, also enable the Port Scanners | Ping Host and NMAP (NASL wrapper) tests.
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/Port_Scanners-300x181.png)
Click Save, then click save again.
Now browse to: Scans > Tasks
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image016-300x32.jpg)
Click the “Pink Wand” icon: New > Advanced Task Wizard
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image018.jpg)
Name the task and select the new scan config you just created. Specify IP, subnet etc you want to scan. Hit “Create” to start the scan for this specific vulnerability.
![](https://www.cb-net.co.uk/wp-content/uploads/2017/05/image020.jpg)
Check the reports as the scan progresses, anything identified needs to be patched, or hardened/ isolated if it is older than those O/S editions that this patch was released for.
Happy hunting…