Change owner of wapiti directory to root:
root@localhost:~# chown -R root:root /usr/local/wapiti-2.2.1/
Make wapiti.py and vulnerability.py executable:
root@localhost:~# chmod 755 /usr/local/wapiti-2.2.1/src/wapiti.py
root@localhost:~# chmod 755 /usr/local/wapiti-2.2.1/src/vulnerability.py
Create wapiti script in /usr/bin
root@localhost:~# touch /usr/bin/wapiti
root@localhost:~# vi /usr/bin/wapiti
Add this to the script:
[code=dos]#!/bin/sh
cd /usr/local/wapiti-2.2.1/src/
./wapiti.py $*[/code]
Check permissions and owner:
root@localhost:~# ls -ld /usr/bin/wapiti
-rwxr-xr-x 1 root root 59 2012-04-10 10:42 /usr/bin/wapiti
Now when you run a relevant Openvas scan, you should see the following in the report (note my scan detected no wapiti vulnerabilities):
Low
NVT: wapiti (NASL wrapper)
Here is the wapiti report:
Vulnerabilities report -- Wapiti http://wapiti.sourceforge.net/
This report has been generated by Wapiti Web Application Scanner