NES 554 Computer Networks Defense Lab #4: Nessus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

NES 554 Computer Networks Defense

Lab #4: Nessus


Due Date: Fri 18/12/2020

Nessus vulnerability scanner


Nessus is a vulnerability scanning tool. It can be used to detect thousands of well-known potential
vulnerabilities on a remote host. Nessus is commonly used by network administrators who want
to keep their domains secured against these common vulnerabilities that malicious hackers and
viruses often look to exploit.
Similarly to nmap, Nessus performs a port scan on the target machine. However, whereas nmap
only tells you what's listening, Nessus can tell you what's vulnerable. One way it can accomplish
this is by performing various checks to determine which services are running on the remote host
(e.g., Apache), what their version numbers are (e.g., 2.2.2), and then checking against a database
of known vulnerabilities that are present in those versions of the services (e.g., mod_rewrite off-
by-one error, CVE-2006-3747).
However, the rules used to detect vulnerabilities are highly flexible. These rules are contained
within Nessus plugins, which are written in a language called NASL (Nessus Attack Scripting
Language). Typically, each vulnerability that Nessus is capable of detecting is expressed as a
plugin. Currently, there are about 40,000 plugins that are shipped with Nessus, and dozens more
are added every week as new vulnerabilities are discovered.
In general, Nessus does not actually perform any exploits - it only detects vulnerabilities. Neither
does Nessus prevent attacks or make any attempts to correct the vulnerabilities - it is still up to the
network administrator to patch these vulnerabilities based on the guidance that Nessus provides.
On UNIX, Nessus operates according to a client-server architecture. The Nessus client connects
to the server, provides it with information, and the server actually runs the scan.
Steps:
1. Install Nessus on your Linux machine. Installation steps are available at:
http://www.fuzzysecurity.com/tutorials/8.html
2. Start the nessus server on your linux machine. The Nessus server will load a number of
plugins. Once this process is completed we can connect to the server.
3. Start Firefox and changing the URL to https://127.0.0.1:8834/
4. A login page will present itself. Login as the nessus user you created, Accept the certificate
warnings(if any). The client will connect to the server and your Nessus environment will be
ready for use.
5. Perform Nessus scan on the Windows machine.
What to hand in?
Be sure to take screen shots and capture the report of the vulnerabilities identified.

You might also like