[quick start Nessus - beginner level]

Posted by voitek on Mon, 03 Jan 2022 03:08:52 +0100

What is Nessus?

This is a vulnerability scanning system based on C/S architecture

What is vulnerability scanning?

Vulnerability scanning is a technical means to find the vulnerabilities of the target system, and further use the discovered vulnerabilities to do something they have always wanted to do but couldn't do before, such as penetration testing. It is like a flexible tank with its own ammunition depot. It can bombard the specified target (operating system, including the services on the system) based on the ammunition depot (it has its own name: Vulnerability Database) and the launcher (here refers to various missing scanning means), so as to judge the safety factor of the target.

What are the common missed scanning methods?

  • One is vulnerability database information matching

    It is divided into two parts. The first part is to obtain information,
    Professional point: remotely detect the port service of the target, record the answers given by the host, and collect the feedback information of the target.
    Rough point: just say hello to the other party and write down the other party's reaction. For example, when I saw an old beauty in the mall, I hugged her shoulder and said, "sister, is it convenient to add wechat?", Beauty's backhand is a slap, PA ~, and then a "blind, I'm male.".

    The second part is information comparison
    Professional point: match the obtained information with the vulnerability database. If the matching conditions are met, it is proved that the vulnerability exists
    Rough point: then I turned my head to respond to the information obtained above, "male" = "male"

  • The other is plug-in attack

    Professional point: simulate the hacker attack method to attack the target. If the attack is successful, it indicates that there are security vulnerabilities

    Rough point: it's just to see who doesn't like you. Go up and have a crackling meal first. If you lie down, it means that the other party is not practicing family.

How to better conduct vulnerability scanning?

First step-Detect the host: confirm whether the attack target is online. (it can be understood as whether the other party is at home)
Step 2-Scan port: obtain target information, such as open port number, service name provided externally, version used, operating system type, etc
(How many windows and doors are there in the other party's house
 Step 3-Vulnerability attack: according to the information obtained by scanning the port, use the vulnerability module to carry out targeted attacks, so as to judge whether there are vulnerabilities
(It can be understood that it is better to pry the lock against the door or to knock it open directly)

Nessus strengths and weaknesses?

Advantages: it is popular in the world, has a complete missed scanning service, and can update the vulnerability database at any time 
Disadvantages: spend money, spend money, spend money (can be activated)

What does Nessus consist of?

client
		User configuration tool    You can configure the scanning target and the vulnerabilities used during scanning
		Result storage/Generate report tool     Generate and store reports based on scan results
 Server side
		The vulnerability library contains various vulnerability information of various operating systems and methods of detecting vulnerabilities
		Scan engine    Conduct vulnerability scanning according to different scanning methods
		The current active scanning knowledge base monitors the current active scanning, provides vulnerability information to the scanning engine, and accepts the scanning results returned by the engine.
Workflow
		Login client tool( web)
		Configure scan targets, create scan policies, and perform scan tasks
		According to the configuration information, call the plug-in for vulnerability scanning
		Wait for the scan to finish and get the scan results
		View and analyze scan results
		Generate vulnerability scan report

What is the idea of Nessus deployment?

  • Download first

     Get installation package address: https://www.tenable.com/downloads/nessus
     Download the corresponding installation package according to your own operating system and architecture
    
  • In the whole activation code

     Function: used to activate Nessus service
     Activation code acquisition address: https://zh-cn.tenable.com/products/nessus/nessus-essentials?tns_redirect=true
    
  • Then start the installation

     decompression
     	windows System: double click Nessus Installation package, next step all the way
     	linux System: dpkg   -i    Nessus-****.ded
     Select version
     	Nessus Essentials  Free version
     	Nessus Professional  professional edition
     	Nessus Manager  Management desk
     	Managed  Scanner  Scanner
     Enter activation code  +  Create management account
     Download plug-ins  + initialization
        Note: this process needs to ensure the stable communication between the network and. If it fails, enter the background and execute the following commands:
        /opt/nessus/sbin/nessuscli  update  --al
     Restart after downloading nessus service
     input Nessus Login user name and password, installation completed
    
  • Note: start service

    windows:

    1. win + r enter services MSc, find Tenable Nessus service to start, stop and restart
    2. cmd enter net stop "Tenable Nessus", net start "Tenable Nessus"

    linux:

    1,systemctl start nessusd ,service nessusd start
    2,systemctl stop nesssusd , service nessusd stop

What simple configurations can be made when logging in Nessus for the first time?

  • Change listening IP and port

    Default: 0.0.0.0   8834
     get into Settings---Advanced
     			User  Interface  User interface
     			Scanning  scanning
     			Logging  Sign in
     			Performance  performance
     			Security  security
     			Miscellaneous  Intermingle
    

Advanced settings allows you to manually configure global settings. A reboot may be required for these settings to take effect Nessus Service or server.
be careful:The settings configured in the scan or policy will override these values.  
			modify IP address      Nessus  Web  Server  IP
			modify Port port    Nessus   Web  Server  Port
  • Software update

    get into Settings---Advanced---Miscellaneous
     		Automatic Update Delay Automatic update interval
     		Automatic Updates  Automatic update plug-in
     		Automatically Update Nessus Automatic update Nessus
    

  • user management

    There are two roles
     	Administrator(Administrator): can access Nessus All functions of
     	Standard(Ordinary users): some functions are limited, such as software update, user management and advanced settings.
        
    From this page, you can view, create, edit, and delete users. After the user is created, a role will be configured for the user, which determines their scanner permissions. In addition, each user
     Can generate a custom API Key to use REST API Authenticate.  
    

	   get into Settings---Users---New User
				Username  user name
				Full Name  full name
				Email mailing address
				Password password
				Role  role
  • Proxy proxy

   get into Settings---Proxy Server
   Proxy server for forwarding HTTP Request. If your organization needs a proxy server, Nessus The proxy server will be used with Nessus Manager or Tenable.io signal communication. Only the host and port fields are required. Provide user name, password, authentication type and password as required user-agent.   
	Host   The host name or of the proxy server IP address
	Port    The port number of the proxy server connection
	Username   The user name of the proxy connection
	Password    Password of the user connecting to the proxy server
	Auth Method  Authentication method
	User-Agent    If the proxy server uses the specified HTTP User agent filter, configure this option
  • SMTP service

    get into Settings---SMTP Server
    SMTP (Simple Mail Transfer Protocol)Is an industry standard for sending and receiving e-mail. Once configured SMTP,The scan results will be sent by e-mail to the list of recipients specified in the e-mail notification configuration of the scan. These results can be customized through filters and require a HTML Compatible email client.  
       Host   SMTP The host name or name of the service IP address
       Port   For connection SMTP Port number of the service
       From (sender email)  Email address to send scan report
       Encryption  Mail content encryption method
       Hostname (for email links)   Nessus Host name or password of the service
       Auth Method   SMTP Service authentication mode
    
  • security policy

    get into Settings---Password Mgmt
     Password management allows you to set password parameters, open login notifications, and set session timeouts. Login notification allows users to view the last successful login and the last failed login attempt(Date, time and IP),And whether there have been any failed login attempts since the last successful login. The modification will take effect after soft restart.  
    be careful:The settings for session timeout and maximum login attempts will not take effect until Nessus Service restart.  
     	Password Complexity   Password complexity
     	Session Timeout (mins)   session time out
     	Max Login Attempts   Maximum login attempts
     	Min Password Length   Minimum password length
     	Login Notifications  Login notification
    
  • Performance monitoring


    get into Settings---Scanner Health
       Overview  summary
     			Current Health  Current performance information
     			Scanner Alerts Scan warning information
     			System Memory Proportion of system memory
     			Nessus Data Disk Space Percentage of data disk space
     			Memory Usage History  Memory usage history
     			CPU Usage History  CPU Usage history
     			Scanning History  Scan history
       Network  network performance
     			Scanning History  Scan history
     			Network Connections Number of network connections
     			Network Traffic network flow
     			Number Of DNS Lookups  DNS Number of queries
     			DNS Lookup Time  DNS Query time
      Alerts warning
    

How to create a simple scan task?


  • Nessus comes with templates - Nessus provides 22 scanning templates by default

     Discovery  Discoverability
     Vulnerabilities  Vulnerability
     Compliance  Compliance
    
  • Scan task configuration

    get into Scans---My Scans---New Scan---Advanced Scan
     BASIC  basic
     	General  summary
     		Name  Scan task name
     		Description  Task description information
     		Folder  Folder to which the scan task belongs
     		Targets  Scan target
     			Single objective
     				192.168.1.11,192.168.1.16,192.168.1.36
     			Continuous target
     				192.168.1.26-192.168.1.56 
     			Mask mode
     				192.168.1.0/24
     		Upload Targets  Specify scan target file template
    

		Schedule Plan execution
			Frequency  frequency
			Starts  start time
			Timezone  time zone
			Summary summary

	   Notifications Email notification
			Email Recipient(s)  Specify recipients
			Result Filters  Specify receive filter file

      REPORT report
		Processing Treatment method
			Override normal verbosity  Enable override mode
			   I have limited disk space. Report as little information as possible
              If disk space is limited, report brief information as much as possible
			   Report as much information as possible
              Report as much information as possible
			Show missing patches that have been superseded
              Displays the missing patches that have been replaced
			Hide results from plugins initiated as a dependency
              The dependency list does not appear in the report
	    Output Output mode
			Allow users to edit scan results  Allow users to edit scan results
			Designate hosts by their DNS name Show hosts DNS information
			Display hosts that respond to ping  Show response ping Host
			Display unreachable hosts  Show unreachable hosts
			Display Unicode characters  whether Unicode display

   After configuration, click Save Save, and then you can execute the task.

summary

Well, now that you have turned here, it shows that the introductory article I wrote is still passable. You can also build a Nessus scanning task in the virtual machine to play. I will update Nessus advanced from time to time later. If you feel that you can write it, remember to like it. Bye.

Topics: security penetration test Web Security