RP:Nessus

[Task 1] Deploy!

[Task 2] Installation
After installation, open nessus

sudo /etc/init.d/nessusd start

Open browser and type

https://localhost:8834/

Select Nessus Essentials and click continue

Input activation code

Create user account

After finish installation, login with credential


[Task 3] Nessus Quiz

  1. As we log into Nessus, we are greeted with a button to launch a scan, what is the name of this button?

New Scan

2. Nessus allows us to create custom templates that can be used during the scan selection as additional scan types, what is the name of the menu where we can set these?

Policies

3. Nessus also allows us to change plugin properties such as hiding them or changing their severity, what menu allows us to change this?

Plugin Rules

4. Nessus can also be run through multiple ‘Scanners’ where multiple installations can work together to complete scans or run scans on remote networks, what menu allows us to see all of these installations?

Scanners

5. Let’s move onto the scan types, what scan allows us to see simply what hosts are ‘alive’?
Click New Scan

Host Discovery

6. One of the most useful scan types, which is considered to be ‘suitable for any host’?

Basic Network Scan

7. Following a few basic scans, it’s often useful to run a scan wherein the scanner can authenticate to systems and evaluate their patching level. What scan allows you to do this?

Credential Patch Audit

8. When performing Web App tests it’s often useful to run which scan? This can be incredibly useful when also using nitko, zap, and burp to gain a full picture of an application.

Web Application Tests


[Task 4] Scanning!

  1. Deploy the machine and connect to the network
  2. Create a new ‘Basic Network Scan’ targeting the deployed VM. What option can we set under ‘BASIC’ to set a time for this scan to run? This can be very useful when network congestion is an issue.

Click Basic Network Scan, and type the name and target

Click Schedule and Enabled

Schedule

3. Under discovery set the scan to cover ports 1–65535. What is this type called?
Click Discovery and select scan type

Port Scan(all ports) ***attention ()

4. As we are connected to the network via a VPN, it may be to our benefit to ‘tone down’ the scan a bit. What scan type can we change to under ‘ADVANCED’ for this lower bandwidth connection?
Click ADVANCED, select scan type

scan low bandwidth links

5. With these options set (other than the time to run) save and launch the scan.
Launch the scan

Wait the for scan to finish

6. After the scan completes, which ‘Vulnerability’ can we view the details of to see the open ports on this host?

Nessus SYN scanner

7. There seems to be a chat server running on this machine, what port is it on?

6667

8. Looks like we have a medium level vulnerability relating to SSH, what is this vulnerability named?

SSH Weak Algorithms Supported

9. What web server type and version is reported by Nessus?

Apache/2.4.99


[Task 5] Wait, there’s mail?

  1. An optional but awesome additional step, link your Nessus box up to an SMTP server via the Settings panel. Google provides this for free if you already have a Gmail account. Adding 2-factor authentication on your account and create an app password, then link Nessus to the Gmail SMTP server via these following settings: https://www.siteground.com/kb/google_free_smtp_server/

Skipped


[Task 6] So you’re telling me that’s how you set up a web app…

  1. Run a web application scan against this new box.
    Click new scan

Click Web Application Tests, set up scan settings, and start

2. What is the plugin id of the plugin that determines the HTTP server type and version?

10107

3. What authentication page is discovered by the scanner that transmits credentials in cleartext?

login.php

4. What is the file extension of the config backup?

Follow the path

.bak

5. Which directory contains example documents? (This will be in a php directory)

Follow the path

/external/phpids/0.6/docs/examples/

6. What vulnerability is this application susceptible to that is associated with X-Frame-Options?

clickjacking

7. What version of php is the server using?

5.5.9–1ubuntu4.26

本文由 泓源视野 作者:admin 发表,其版权均为 泓源视野 所有,文章内容系作者个人观点,不代表 泓源视野 对观点赞同或支持。如需转载,请注明文章来源。

发表评论

Protected with IP Blacklist CloudIP Blacklist Cloud

您是第8239451 位访客, 您的IP是:[3.89.87.12]