In addition to the answers already given, OpenVAS (http://www.openvas.org) is a free-to-use fork of an older version of the commercial Nessus scanner. It uses the same vulnerability feeds, though sometimes newer issues may be delayed up to a week in the free feeds. It also doesn't have all the bells and whistles the commercial scanners have these days. Hard to argue with free, though.
In my experience, it's important that you and your organization understand what the scope and definition of "get an external pen test" is. Vulnerability assessment and penetration testing are not one in the same. If you're in a regulated environment these distinctions are crucial.
The tools you'll most likely have access to are port and vulnerability scanners. These are just quick information gathering tactics in the penetration testing process. A penetration test should actively attempt to compromise a system not just see if it's running Apache. As far as performing port and vulnerability scans on your systems it's pretty simple from a technical perspective but note there may be legal concerns depending our your environment and where your scans are sourced from.
As far as tools, OpenVAS will get you Nessus like reporting.
(Nessus)[http://www.nessus.org] is a solid product, especially at $1200 per year.
(OpenVas)[http://www.openvas.org/] is an open source fork of nessus, but doesn't have as many vulnerability pluggins as nessus.
Have you considered web application firewall(s) to help protect your clients?
Openvas is mainly a network vulnerability scanner. This is similar to the local security check part of openvas, which is not as commonly used.
I've used neither the local security check part of openvas nor Vuls, so can't really tell how they compare in terms of signatures, except to say I think openvas relies on OVAL and this seems to rely on CVEs directly.
As far as scanning is concerned, and if you are on a tight budget, then OpenVAS (http://www.openvas.org/) is a decent option, it's a a free security scanner. I'll admit that it's not particularly easy to use, but once it's up and running it works pretty well.
For logging etc. EventSentry (http://www.eventsentry.com) can help with a variety of PCI requirements, including real-time (event) log monitoring, file checksum monitoring, software (version) monitoring & inventory, AD changes, file access tracking (part of the compliance features) and more.
OpenVAS have made one. Doesn't appear to be packaged in any repos for common OS's, so you'll have to do it old school and compile it. Looks like an autotools project.
Never used it myself, so YMMV.
Can't say I understand the question fully. But out of the sake of trying. I use burpsuite http://portswigger.net/burp/ when doing blackbox testing of software. $300 / year is expensive. I've previously used webscarab. Both require an understanding of whats happening, so it' not click and shoot.
If you want more click and shoot there are some more expensive commercial options. Your mileage may vary.
Does this even remotely answer your question? A slightly different answer may be something like OpenVas. http://www.openvas.org/ . I have no clue what you're asking for. Just offering various sec tools. Don't be stupid with them!
Nessus, even the free version, should do. That or OpenVAS, which is open source. Again, I would still ask for permission, but this is a heck of a lot safer than autopwning the whole network.
For threat modeling:
In this case I would think Tenable's free offering might be of value. There are restrictions compared to the paid ones but for a small home network it is often more than enough.
I was hearing that Rumble.run is doing vuln scanning now which is agent based asset management. They also have a home free offering.
Obviously OpenVAS (http://www.openvas.org/) is the open source version of Greenbone (which might explain why you are seeing a "sale price).
Hopefully that helps.
Use OpenVas. You can schedule scans. It will do everything automatically. Then you will have all the data you need about your security posture. Looking for changes between scans is a manual process. I too would like a way to flag changes from last scan. It's open source so if you come up with something you can share it.with the community.
> What would be the best tool to scan the network to get any info?
nmap
plus maybe OpenVAS. On today's networks, that's only going to give you a minority of the story. The good news is that tiny 15-seat organizations generally have very basic systems performing very predictable functions: file, print, email, etc.
> I have very limited information on any switches or the server
Start by looking at them, seeing what manufacturer and model they are, seeing what's plugged in where, what lights are lit, and why.
Very unlikely since OpenVAS switched the knowledgebase backend for openvas-scanner from files to redis in OpenVAS 8 ;-)
Unless you mean the version of the openvas-manager, that is 6.x (but part of OpenVAS 8). Numbering is a bit confusing, but there is a nice overview at http://www.openvas.org/install-source.html
This is how I did it. I apt-get removed the existing installation of OpenVAS and started over. I then installed OpenVAS per their guide http://www.openvas.org/setup-and-start.html
And it runs like a champ. I have also had many many struggles with OpenVAS over the years. If you post some logs/errors I can likely help you out.
Practice locally until you know what you are doing. you shouldn't be running Kali on anything on the internet until you are well versed in a protected environment.
It looks like there is an option for CLI on Open VAS. http://www.openvas.org/src-doc/openvas-cli-1.3.0/index.html
OpenVAS has the omp command-line utility: http://www.openvas.org/omp-5-0.html
We use this to cycle through tasks configured in the GUI. You need the unique task ID to initiate a scan from the command line, e.g.
You can grab the entire task list with:
omp -G
and then feed the task you want to scan to:
omp -S <taskid>