This document provides instructions for completing Lab #4 on Nessus vulnerability scanning. It describes Nessus as a tool that scans remote hosts to detect thousands of known vulnerabilities by checking services, versions, and databases of exploits. The document explains that Nessus identifies vulnerabilities but does not exploit systems or fix issues, rather it provides guidance to network administrators. Finally, it lists 5 steps for installing Nessus on Linux and scanning a Windows machine, collecting screenshots and a report.
This document provides instructions for completing Lab #4 on Nessus vulnerability scanning. It describes Nessus as a tool that scans remote hosts to detect thousands of known vulnerabilities by checking services, versions, and databases of exploits. The document explains that Nessus identifies vulnerabilities but does not exploit systems or fix issues, rather it provides guidance to network administrators. Finally, it lists 5 steps for installing Nessus on Linux and scanning a Windows machine, collecting screenshots and a report.
This document provides instructions for completing Lab #4 on Nessus vulnerability scanning. It describes Nessus as a tool that scans remote hosts to detect thousands of known vulnerabilities by checking services, versions, and databases of exploits. The document explains that Nessus identifies vulnerabilities but does not exploit systems or fix issues, rather it provides guidance to network administrators. Finally, it lists 5 steps for installing Nessus on Linux and scanning a Windows machine, collecting screenshots and a report.
This document provides instructions for completing Lab #4 on Nessus vulnerability scanning. It describes Nessus as a tool that scans remote hosts to detect thousands of known vulnerabilities by checking services, versions, and databases of exploits. The document explains that Nessus identifies vulnerabilities but does not exploit systems or fix issues, rather it provides guidance to network administrators. Finally, it lists 5 steps for installing Nessus on Linux and scanning a Windows machine, collecting screenshots and a report.
Nessus is a vulnerability scanning tool. It can be used to detect thousands of well-known potential vulnerabilities on a remote host. Nessus is commonly used by network administrators who want to keep their domains secured against these common vulnerabilities that malicious hackers and viruses often look to exploit. Similarly to nmap, Nessus performs a port scan on the target machine. However, whereas nmap only tells you what's listening, Nessus can tell you what's vulnerable. One way it can accomplish this is by performing various checks to determine which services are running on the remote host (e.g., Apache), what their version numbers are (e.g., 2.2.2), and then checking against a database of known vulnerabilities that are present in those versions of the services (e.g., mod_rewrite off- by-one error, CVE-2006-3747). However, the rules used to detect vulnerabilities are highly flexible. These rules are contained within Nessus plugins, which are written in a language called NASL (Nessus Attack Scripting Language). Typically, each vulnerability that Nessus is capable of detecting is expressed as a plugin. Currently, there are about 40,000 plugins that are shipped with Nessus, and dozens more are added every week as new vulnerabilities are discovered. In general, Nessus does not actually perform any exploits - it only detects vulnerabilities. Neither does Nessus prevent attacks or make any attempts to correct the vulnerabilities - it is still up to the network administrator to patch these vulnerabilities based on the guidance that Nessus provides. On UNIX, Nessus operates according to a client-server architecture. The Nessus client connects to the server, provides it with information, and the server actually runs the scan. Steps: 1. Install Nessus on your Linux machine. Installation steps are available at: http://www.fuzzysecurity.com/tutorials/8.html 2. Start the nessus server on your linux machine. The Nessus server will load a number of plugins. Once this process is completed we can connect to the server. 3. Start Firefox and changing the URL to https://127.0.0.1:8834/ 4. A login page will present itself. Login as the nessus user you created, Accept the certificate warnings(if any). The client will connect to the server and your Nessus environment will be ready for use. 5. Perform Nessus scan on the Windows machine. What to hand in? Be sure to take screen shots and capture the report of the vulnerabilities identified.