Internal Vulnerability Assessment using Nessus

Nessus

Nessus is an network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. Nessus employs the Nessus Attack Scripting Language (NASL), a simple language that describes individual threats and potential attacks.

Nessus has a modular architecture consisting of centralised servers that conduct scanning, and remote clients that allow for administrator interaction. Administrators can include NASL descriptions of all suspected vulnerabilities to develop customised scans. 

Nessus allows scans for the following types of vulnerabilities:

  • Vulnerabilities that allow a remote hacker to control or access sensitive data on a system.
  • Misconfiguration (e.g. open mail relay, missing patches, etc.).
  • Default passwords, a few common passwords, and blank/absent passwords on some system accounts.
  • Denials of service against the TCP/IP stack by using malformed packets
  • Preparation for PCI DSS audits.The Nessus server is currently available for Unix, Linux and FreeBSD. The client is available for Unix- or Windows-based operating systems.

Installation (LINUX)

Before you begin, download the Nessus installation file that corresponds to your operating system from the Tenable Downloads Page (https://www.tenable.com/downloads).

  1. Install the Nessus installation package downloaded from the Downloads Page (https://www.tenable.com/downloads). The specific filename will vary depending on your platform and version. The following table contains some examples:

    2. Start the Nessus daemon using the following command depending on your platform:



    3. Complete the installation using your web browser (https://docs.tenable.com/cloud/Content/AdditionalResources/InstallNessusScanner.htm#BrowserPortion)

Vulnerability Assessment

  • A vulnerability assessment is the process of identifying, quantifying, and prioritising (or ranking) the vulnerabilities in a system.
  • Assessments are typically performed according to the following steps:
  • Cataloging assets and capabilities (resources) in a system.
  • Assigning quantifiable value (or at least rank order) and importance to those resources
  • Identifying the vulnerabilities or potential threats to each resource
  • Mitigating or eliminating the most serious vulnerabilities for the most valuable resources

Vulnerability Assessment using Nessus

Once the Nessus is setup, open Nessus dashboard through web browser.













Now click on New Scan and select appropriate scan template.


Here we will choose internal PCI network scan template and proceed. Now we need to fill details like Name, Description and set all host/IP which we need to scan. It can be a IP, IP range or URL(test.com). We can also upload a target file consisting big list of host/IP.


As we need to perform an Internal Vulnerability Assessment, this requires ssh box credentials to be added in credentials tab.
Note: we need to add user with admin privileges and sudo access so that it can login to every target box and scan.


In Plugin tab, it tells what type of vulnerability scan plugin are available. This is predefined in internal PCI network scan. To customise this we need to choose Advance scan template according to the requirement.
Now Save the setting and Launch the scan. We can also schedule a scan in schedule section under settings tab.
Once the scan is completed, we can see the vulnerabilities listed. On top right there will be an option "Export" to download the report with many format(CSV, HTML, Nessus, Nessus DB).

Referrences
  • Wikipedia
  • Tenable.com

Comments

  1. thanks for this usefull article, waiting for this article like this again. Cyber Attack

    ReplyDelete
  2. I really loved reading your blog. It was very well authored and easy to understand.

    Vulnerability Scanning Tools

    ReplyDelete

Post a Comment

Popular posts from this blog

Reconnaissance