Skip to content

Latest commit

 

History

History
130 lines (72 loc) · 7.07 KB

README.md

File metadata and controls

130 lines (72 loc) · 7.07 KB

Nessus-Vulnerability-Scanner

How to Install Nessus and Run Vulnerability Scans

Tenable-Logo2021-Reversed

Overview

Nessus is a tool developed by Tenable that scans for security vulnerabilites that can be found in devices, operating systems, clound-based services, applications and other network-related components. Nessus conducts vurnerability assessments that aid endpoint users in hardening security infranstructures by identify system flaws, missing patches, malware and misconfigurations, etc..

This README.md will give a general overview of Teanable Nessus.

Registration

We will be using Nessus Essential because it is Tenable's free vulnerability assessment solution. After pressing "Get Started" to register, an activation code will be sent to the submitted email.

The next page will prompt to press the download button to enter the Download page.

https://www.tenable.com/products/nessus/nessus-essentials
Screenshot 2023-11-11 at 8 36 04 PM Screenshot 2023-11-11 at 8 51 36 PM

Download and installation

Select your version and platform/flavor of Nessus to download and install.

Screenshot 2023-11-11 at 8 52 19 PM

Connect to server

1.) After installation, the browser will open up a localhost SSL server page that uses port 8834.

-Note: It is a good idea to bookmark or save the address in a safe place because it is easy to forgot.
Screenshot 2023-11-11 at 8 54 55 PM

2.) Connect via SSL and the service will start to initialize.

Screenshot 2023-11-11 at 8 55 26 PM

3.) Select "Nessus Essentials"

Screenshot 2023-11-12 at 7 48 42 PM

4.) After entering contact infomation, select "Skip" since we already recived an acivation code via email.

Screenshot 2023-11-12 at 7 49 08 PM

5.) Enter the activation code and continue.

Screenshot 2023-11-12 at 7 49 41 PM

6.) Create a username/password for your account and then press submit. Nessus will finish up configurations.

Screenshot 2023-11-12 at 7 49 58 PM

Featured detections

This is the main page of Nessus Essentials. All scans are placed here unless moved in a folder.

Screenshot 2023-11-12 at 5 21 14 AM

Nessus offers different templetes that cover 3 vulnerability scanner categories: Discovery, Vulnerabilities, and Compliance.

Screenshot 2023-11-12 at 5 23 27 AM

Types of Network Scans

  • Uncredential: Does not utilize privleged credentials. Limited in scope but can still identify basic vulerabilities.

  • Credential: Utilizes privleged credentials to provide a more in-depth anlysis with accurate resilts.

    I have attached examples of conducted scans from my MacOS device. It showcases how much more information can be acquired from a credentialed scan compared to a uncredentialed scan.

      Note: Scans took place a month apart from each other to show how quickly vulnerabilities can manifest. 
    

Uncredential

Configurations

Screenshot 2023-11-12 at 5 31 19 AM

Vulnerabilities

  • Found vulnerabilities: 49
    • 2 CVSS
    • 47 of the vulnerabilities are infomational, which are actually facts rather than vulnerabilities.
Screenshot 2023-11-12 at 5 31 41 AM Screenshot 2023-11-12 at 5 39 59 AM

Credentialed

Configurations

Screenshot 2023-11-12 at 5 25 51 AM Screenshot 2023-11-12 at 5 26 55 AM

Vulnerabilities

  • Found vulnerabilities: 52
    • 5 CVSS
    • 47 of the vulnerabilities are infomational, which are actually facts rather than vulnerabilities.
Screenshot 2023-11-12 at 5 29 00 AM Screenshot 2023-11-12 at 5 30 00 AM

Remediations

Credential scans have a leg up on uncredential scans due to the privleged access it has to machines. Nessus provides remediations for ]known CVEs when credentialed scans are conducted.

Note: I have applied remediations to my device to make it vulnerability free.
Screenshot 2023-11-12 at 5 30 19 AM

Conclusion

Tenable Nessus is one of the many vulnerabilty scanners services available on the market. No matter if it personal or business-related, scanners are essensial for protecting assets. Risk, threat, and vulnerability management is a key element in the world of security.