Internal Vulnerability Assessment using Nessus
Nessus
Nessus is an network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. Nessus employs the Nessus Attack Scripting Language (NASL), a simple language that describes individual threats and potential attacks.
Nessus has a modular architecture consisting of centralised servers that conduct scanning, and remote clients that allow for administrator interaction. Administrators can include NASL descriptions of all suspected vulnerabilities to develop customised scans.
Nessus allows scans for the following types of vulnerabilities:
- Vulnerabilities that allow a remote hacker to control or access sensitive data on a system.
- Misconfiguration (e.g. open mail relay, missing patches, etc.).
- Default passwords, a few common passwords, and blank/absent passwords on some system accounts.
- Denials of service against the TCP/IP stack by using malformed packets
- Preparation for PCI DSS audits.The Nessus server is currently available for Unix, Linux and FreeBSD. The client is available for Unix- or Windows-based operating systems.
Installation (LINUX)
Before you begin, download the Nessus installation file that corresponds to your operating system from the Tenable Downloads Page (https://www.tenable.com/downloads).
- Install the Nessus installation package downloaded from the Downloads Page (https://www.tenable.com/downloads). The specific filename will vary depending on your platform and version. The following table contains some examples:
Vulnerability Assessment
- A vulnerability assessment is the process of identifying, quantifying, and prioritising (or ranking) the vulnerabilities in a system.
- Assessments are typically performed according to the following steps:
- Cataloging assets and capabilities (resources) in a system.
- Assigning quantifiable value (or at least rank order) and importance to those resources
- Identifying the vulnerabilities or potential threats to each resource
- Mitigating or eliminating the most serious vulnerabilities for the most valuable resources
Vulnerability Assessment using Nessus
Once the Nessus is setup, open Nessus dashboard through web browser.
Note: we need to add user with admin privileges and sudo access so that it can login to every target box and scan.
In Plugin tab, it tells what type of vulnerability scan plugin are available. This is predefined in internal PCI network scan. To customise this we need to choose Advance scan template according to the requirement.
Now Save the setting and Launch the scan. We can also schedule a scan in schedule section under settings tab.
Once the scan is completed, we can see the vulnerabilities listed. On top right there will be an option "Export" to download the report with many format(CSV, HTML, Nessus, Nessus DB).
Now Save the setting and Launch the scan. We can also schedule a scan in schedule section under settings tab.
Once the scan is completed, we can see the vulnerabilities listed. On top right there will be an option "Export" to download the report with many format(CSV, HTML, Nessus, Nessus DB).
Referrences
- Wikipedia
- Tenable.com
thanks for this usefull article, waiting for this article like this again. Cyber Attack
ReplyDeleteI really loved reading your blog. It was very well authored and easy to understand.
ReplyDeleteVulnerability Scanning Tools