Chapter 5 Vulnerability Scanning

5.1 Using Nessus

5.1.1 Introduction to Nessus

Nessus is a widely used network vulnerability scanner used to assess the security of computer systems, network devices, and applications. Developed and maintained by Tenable Network Security, it helps administrators and security professionals discover security holes and weaknesses that exist in systems.

  1. Nessus can scan target systems, identify potential vulnerabilities, and generate reports to help organizations understand their cybersecurity posture. It uses a series of predefined vulnerability detection rules and patterns to conduct a comprehensive scan of the target system and provide a detailed description of the vulnerability, risk assessment and recommended remediation measures.
  2. Nessus supports scanning a variety of operating systems, network devices, and applications, including Windows, Linux, UNIX, network routers, firewalls, and web applications. It can also perform exploit attempts to verify the security of the system and identify weaknesses that could expose the system to attack.
  3. Nessus is a powerful security tool that is widely used by businesses and organizations to help them discover and resolve security issues in their systems, thereby improving network security.
  4. Nessus is one of the most widely deployed cybersecurity technologies in the world, built for the modern attack surface. Each feature is designed to make vulnerability assessment simple, easy and intuitive. With Nessus, you invest less time and effort in assessing vulnerabilities and prioritizing analysis and remediation to stay one step ahead of attackers.

5.1.2 Install and configure Nessus

  • Install Nessus
  1. Log in to the official website and click Register Now

A real email address must be filled in to receive the activation code.

image-20230613221950082

Wait a moment and enter the download page, download link: Download Nessus | Tenable®

image-20230613222015605

Select the version and system you want to download

image-20230611111821202

What we chose is:Nessus-10.5.2-debian10_amd64.deb, for kali linux

Activation code received by email

image-20230613222058654

  1. Start the kali linux virtual machine and drag in the Nessus-10.5.2-debian10_amd64.deb file we downloaded.
  • Right click on the desktop and open as root

image-20230524111033978

  • Right click and select: Open terminal here

image-20230611120439115

  • Execute installation command
dpkq -i +‘安装包名称’
dpkg -i Nessus-10.5.2-debian10_amd64.deb

image-20230524111436410

  • Copy and enter the following code

image-20230611120508142

image-20230524115821375

  • Right click on this link: Open link

image-20230611120605338

  • Enter this page

image-20230524120257663

The translation is as follows:

  • Select continue

image-20230611120707353

  • Select: Register for Nessus Essentials

image-20230524120907416

image-20230611120735593

  • Register on the Nessus website ( note that the email here uses a real email to receive the activation code, provided you have not registered on the official website)

image-20230524121751313

We have already registered when we registered and downloaded Nessus-10.5.2-debian10_amd64.deb. There is no need to register again. You can click Skip.

image-20230611120757817

Just enter the activation code received by our email

image-20230524122255662

  • Create a Nessus account

Username: admin

Password: ***, click submit

image-20230611120829364

After the setting is completed, the plug-in in nessus will start to be downloaded (the plug-in is from a foreign website, if the network is unstable, the download will fail)

image-20230524122625502

After the installation is complete, enter Nessus directly.

image-20230611120920435

We can view license and other information in settings

image-20230524123144706

Nessus is in the process of compiling and updating the plugin. Plugins are components used by Nessus to detect and assess system vulnerabilities.

During the compilation process, some Nessus features may be limited or unavailable until the compilation is complete. This is because the plugin needs to be updated to include the latest vulnerability detection and security testing.

Compilation time depends on the number of plugins and the speed of your system. It is recommended to wait for some time until the compilation process is complete before trying to scan or evaluate with Nessus. Once compilation is complete, Nessus will have the latest plugins and be fully functional again.

Please note that the compilation process is a normal part of Nessus operation and it is important to ensure that the plugin is updated regularly to maintain the effectiveness of vulnerability scans

Note: The free version of Nessus can only scan 16 IPs

At this point, the installation of Nessus is complete.

Open any of the following URLs in kali's local browser:

You can access Nessus

5.1.3 Scan for local vulnerabilities

  • Create a new scanning task, open the terminal, and start the nessus service

The command is as follows:

/bin/systemctl start nessusd.service

In Firefox, enter the following URL: https://127.0.0.1:8834

image-20230605165542411

Enter username and password

Enter the interface

image-20230605165927678

New scan

Select My Scans→Create a new scan.

Click Advanced Scan to configure the scan.

image-20230605170824556

Configure the project name, description of the project, and most importantly the target address.

If there is a target login account or password, you can configure it in the Credentials option. For Windows, fill in Windows, and for Linux, fill in Linux.(can be omitted)

image-20230605171603178

We can view the plug-in information used in the Plugins option.

After the configuration is completed, we click save to save.

image-20230605171929686

Click the triangle button to start scanning. Click this task to view the scanning details.

Click on On Demand with your mouse to see detailed information.

image-20230605172807317

We click on "Vulnerables" and we can see the vulnerabilities we found.

image-20230605174010588

At this point, the vulnerability scan is completed.

Guess you like

Origin blog.csdn.net/m0_63451989/article/details/132686842