Quick Start Guide
This guide will walk you through creating your first project, running a vulnerability scan, and generating a comprehensive security report using Simple Vulnerability Manager.Prerequisites: Make sure you have installed SVM and at least one scanning tool (OpenVAS, Nmap, or Nessus recommended).
Your First Security Assessment
Launch SVM
Start the Simple Vulnerability Manager application.Windows: Launch from Start Menu or run
svm.exeLinux: Execute from installation directoryYou’ll see the main SVM interface with access to:- Project management
- Vulnerability database
- Scanning tools
- Reporting features
Create a New Project
Projects in SVM organize your security assessments per client or target.
- Click “New Project” or navigate to the Projects section
- Enter project details:
- Project Name: e.g., “Acme Corp Security Assessment”
- Client Name: Organization being assessed
- Description: Brief overview of the assessment scope
- Target IP/Domain: The system you’re testing
- Click “Create” to initialize the project
All scan results, screenshots, and notes will be associated with this project for organized reporting.
Configure Your Target
Specify what you want to scan:Target Types:
- Single IP:
192.168.1.100 - Multiple IPs:
192.168.1.100,192.168.1.101 - IP Range:
192.168.1.1-192.168.1.254 - Domain:
example.com - URL:
https://example.com
- Web Application Security
- Infrastructure/Service Scanning
- Mobile Application Security
Select a Scanning Tool
Choose the appropriate scanner for your assessment:
For Infrastructure Scanning
- OpenVAS
- Nmap
- Nessus
Best for: Comprehensive vulnerability assessment
- Select “OpenVAS Scan” from the tools menu
- Configure scan parameters:
- Server: OpenVAS server IP (default:
127.0.0.1) - Port: OpenVAS port (default:
9390) - Username:
admin - Password:
OpenVAS(default, change if modified) - Scan Config: Choose from:
- Full and fast
- Full and deep
- System Discovery
- Report Format: HTML, PDF, or XML
- Server: OpenVAS server IP (default:
- Click “Start Scan”
OpenVAS scans can take 30 minutes to several hours depending on the target size and scan configuration.
For Web Application Scanning
Burp Suite
Manual and automated web app testing with proxy capabilities
Arachni
Automated web application security scanner
Acunetix
Commercial web vulnerability scanner
Netsparker
Automated web application security scanner
For Mobile Security
MobSF
Static and dynamic analysis for Android/iOS apps
QARK
Quick Android Review Kit for APK analysis
Monitor Scan Progress
SVM displays real-time scan progress:
- Scanning Status: Active, Queued, or Completed
- Progress Indicator: Percentage complete (for supported tools)
- Time Elapsed: Duration of current scan
- Vulnerabilities Found: Live count during scan
- Nmap: 5-30 minutes
- OpenVAS (Full & Fast): 30-90 minutes
- OpenVAS (Full & Deep): 2-6 hours
- Web scanners: 15 minutes to 2 hours
Review Scan Results
Once the scan completes, SVM automatically processes the results:
- View Summary: See vulnerability count by severity
- Critical
- High
- Medium
- Low
- Informational
- Browse Vulnerabilities: Click on any finding to see:
- Detailed description
- Affected systems/services
- CVSS score
- CVE references
- Exploit availability
- Add Evidence: For each vulnerability:
- Add custom notes and observations
- Upload screenshots
- Mark false positives
- Assign remediation priority
Enhance with Vulnerability Database
SVM’s built-in database provides comprehensive vulnerability information:
- Navigate to Vulnerability Database
- Browse categories:
- Web Scanners: XSS, SQLi, CSRF, authentication issues
- Service Scanners: Misconfigurations, missing patches, weak protocols
- Static Scanners: Code quality and security issues
- Mobile: Android/iOS specific vulnerabilities
- For detected vulnerabilities, add from database:
- Click “Add to Project”
- Review the pre-filled information:
- What creates the problem
- System impact
- Remediation steps
- Customize for your specific finding
The vulnerability database is continuously updated with the latest security research and remediation guidance.
Generate Professional Report
Create a comprehensive security assessment report:Example Nmap Report Process:
- Select “Generate Report” from the project menu
- Choose report format:
- HTML: Interactive web-based report
- PDF: Professional document for distribution
- Word: Customizable template (uses Template_SVM.dotx)
- XML: For integration with other tools
- Configure report options:
- Include executive summary
- Add technical details
- Attach screenshots and evidence
- Filter by severity level
- Include remediation timeline
- Click “Generate”
Review and Deliver
Your report is now ready:
- Preview: SVM automatically opens the report for review
- Validate: Ensure all findings are accurate and properly documented
- Export: Save to your preferred location
- Share: Deliver to your client or security team
Reports include:
- Executive summary with risk overview
- Detailed findings with evidence
- Remediation recommendations
- Technical appendices
- Scan metadata and methodology
Example Workflow: OpenVAS Infrastructure Scan
Here’s a complete example of scanning a server with OpenVAS:SVM automates this entire process. The commands above show what happens behind the scenes.
Example Workflow: Nmap Network Discovery
Best Practices
Authorization
Always obtain written permission before scanning any system you don’t own. Unauthorized scanning may be illegal.
Scope Definition
Clearly define the assessment scope in your project. Document:
- Target systems
- Allowed testing methods
- Excluded systems
- Testing timeframes
Evidence Collection
Take screenshots and detailed notes for every finding. This evidence:
- Validates vulnerabilities
- Helps in remediation
- Protects against disputes
Safe Scanning
Be cautious with aggressive scans:
- Start with passive reconnaissance
- Use “Full and Fast” before “Full and Deep”
- Schedule intensive scans during maintenance windows
- Monitor target systems for issues
Next Steps
Advanced Features
Explore SVM’s advanced capabilities:
- Custom vulnerability templates
- Multi-target scanning
- Scan scheduling
- Template customization
Tool Integration
Learn how to integrate additional tools:
- Custom scanner scripts
- API integrations
- Remote scanning setup
FAQ & Wiki
Browse common questions and solutions in the community wiki
Join the Community
Connect with other SVM users and stay updated on new features
Troubleshooting Common Issues
Scan fails to start
Scan fails to start
Possible causes:
- Tool not properly installed or configured
- Incorrect credentials (OpenVAS, Nessus)
- Target not reachable
- Firewall blocking scanner
- Verify tool installation: Check the tool appears in SVM’s available scanners
- Test connectivity: Ping the target and ensure ports are accessible
- Check credentials: Verify OpenVAS/Nessus login works manually
- Review firewall rules: Ensure scanning traffic is permitted
OpenVAS Internal Error
OpenVAS Internal Error
Error: Scan status shows “Internal Error”Solutions:
Report not generating
Report not generating
Possible causes:
- Scan did not complete successfully
- Report format not supported by scanner
- Insufficient disk space
- Verify scan reached “Done” status
- Check SVM logs for error messages
- Ensure output directory is writable
- Try alternative report format
No vulnerabilities found
No vulnerabilities found
This might be normal, but verify:
- Target is responding to probes
- Scan configuration is appropriate (not too conservative)
- Firewall isn’t blocking scan traffic
- Target is actually vulnerable (test with known-vulnerable systems)
Support
Need help? Here are your resources:- FAQ: GitHub Wiki
- Community: @SimpleVulnManag on Twitter
- Issues: GitHub Issues
- Enterprise Support: contacto@simplevulnerabilitymanager.com
You’re now ready to perform comprehensive security assessments with Simple Vulnerability Manager. Happy scanning!