πŸ‘¨β€πŸ’»
Jawad's Notes
  • πŸ‘¨β€πŸ«INFOSEC
    • πŸ•ΈοΈWeb
      • Burp Suite: Setting Foxyproxy
      • XSS
      • Wappalyzer
      • Directory Traversal
      • LFI
        • PHP Wrappers
        • RFI
      • Reverse Shell
        • Command Injection Quick Tips
      • File Upload
      • WPScan
      • SQL Injection
        • Schemas
        • SQLmap
        • MSSQL
        • MySQL
        • PostgreSQL
    • πŸ”§Tools
      • Whois
      • DNSRecon
      • DNSenum
      • nslookup
      • Netcat
        • Powercat
      • Nmap
        • Nmap Scripting Engine
        • Test-NetConnection
        • Grep
      • Server Message Block (SMB)
      • SNMP
      • SMTP
      • ExifTool
      • Search Engine Hacking
      • Source Control Hacking
      • Nessus
      • Canarytokens
      • Qualys SSL Server Test
      • Security Headers
      • theHarvester
      • Shodan
      • Gobuster
        • Dirb
      • Searchsploit
      • Password Cracking
        • Hashcat
        • John The Ripper
        • Hydra
        • hashID
        • CPU vs GPU
    • 🐧Linux
      • Symbols
      • cat
      • curl
      • openvpn
      • tcpdump
      • Remote Desktop
      • SmbShare
      • Tmux
      • Convert Windows-style line endings (CRLF) to Unix-style (LF)
      • SSH
    • πŸ–₯️Macros in Office
    • 🍎Enhancing Your MacOS Terminal Experience
    • 🚩CTF
      • SQL Injection
        • WHERE clause allowing retrieval of hidden data
        • Allowing login bypass
        • UNION attack, determining the number of columns returned by the query
        • UNION attack, finding a column containing text
        • UNION attack, retrieving data from other tables
        • UNION attack, retrieving multiple values in a single column
        • Querying the database type and version on Oracle
Powered by GitBook
On this page
  1. INFOSEC
  2. Tools

Nessus

Nessus is a widely-used cybersecurity tool designed for vulnerability scanning and assessing network security. Developed by Tenable Network Security, Nessus helps organizations identify and fix vulnerabilities such as software flaws, missing patches, or misconfigurations in their networks before attackers can exploit them. It features an intuitive interface and robust reporting capabilities, making it accessible for IT professionals to conduct comprehensive assessments. Nessus supports a wide range of operating systems and can scan various types of devices, making it a versatile tool for ensuring the security of both small and large networks.

1. Basic Network Scan

To perform a basic network vulnerability scan with Nessus:

  1. Configure a New Scan: Set up a new scan by choosing a template such as "Basic Network Scan."

  2. Set Target IP Addresses: Input the range of IP addresses or specific hosts you want to scan.

  3. Run the Scan: Execute the scan to assess the network for common vulnerabilities and misconfigurations.

  4. Review the Report: Analyze the generated report to identify critical vulnerabilities and recommended remediations.

2. Credentialed Patch Audit

Performing a credentialed scan allows Nessus to log into systems using provided credentials to more thoroughly assess the system:

  1. Select the 'Credentialed Patch Audit' Template: This scan requires administrator credentials to access the system.

  2. Input Credentials: Securely input the administrator credentials for the systems to be scanned.

  3. Define the Target: Specify the IP addresses or hostnames of the devices.

  4. Execute the Scan: Start the scan to check for missing patches and insecure configurations.

  5. Evaluate Findings: The detailed report will show missing patches and configurations that need attention.

3. Web Application Testing

Nessus can also be configured to perform web application scans to detect vulnerabilities in web applications:

  1. Choose a Web Application Scan Template: Select a template focused on web applications.

  2. Configure Scan Settings: Input the URL of the web application and other relevant settings such as authentication if needed.

  3. Run the Scan: Initiate the scan to test for SQL injection, XSS, and other web-specific vulnerabilities.

  4. Analyze Output: Review the vulnerabilities found and examine the detailed explanations and remediation steps.

4. Compliance Checking

Nessus can assess compliance with standards like PCI-DSS, HIPAA, and others:

  1. Select Compliance Template: Choose a compliance template based on the standard you are auditing against.

  2. Configure the Scan: Provide details about the network or system segment that needs compliance verification.

  3. Execute and Review: Run the compliance scan and then analyze the report to see where the system stands in relation to the compliance requirements.

5. Mobile Device Scan

To check for vulnerabilities in mobile environments:

  1. Setup Mobile Device Scan: Use the appropriate Nessus template for mobile devices.

  2. Specify Devices: Enter the IP ranges or specific addresses for mobile devices connected to your network.

  3. Scan and Review: Start the scan to identify vulnerabilities related to mobile operating systems and applications.

These examples illustrate the versatility of Nessus in different environments and use cases, showcasing its ability to adapt to varying security needs of modern IT infrastructures.

PreviousSource Control HackingNextCanarytokens

Last updated 1 year ago

πŸ‘¨β€πŸ«
πŸ”§