Noirchapeau's Gitbook
Noirchapeau
Noirchapeau
  • Welcome to NoirChapeau Gitbook
  • Network Mapping and Security Auditing Tool
  • Footprinting - Enumeration and Information Gathering Notes
    • FTP Pentesting Notes
    • SMB Pentesting Notes
    • SSH Pentesting Notes
    • IPMI Pentesting Notes
    • Oracle TNS Pentesting Notes
    • MSSQL Pentesting Notes
    • MySQL Pentesting Notes
    • SNMP Pentesting Notes
    • IMAP/POP3 Pentesting Notes
    • SMTP Pentesting Notes
    • DNS Pentesting Notes
    • NFS Pentesting Notes
  • Web Reconnaissance Notes
  • Vulnerability Assessment Notes
    • Nessus Vulnerability Scanner Notes
    • OpenVAS (GVM) Vulnerability Scanner Notes
  • File Transfer Techniques for Pentesting
    • Advanced File Transfer Techniques
    • File Transfer Detection & Evasion Techniques
  • Shells & Payloads: Shell Overview
    • Shells & Payloads: Payloads Overview
    • Shells & Payloads: Web Shells Overview
    • Shells & Payloads: Detection & Prevention
  • Metasploit
    • Working with Metasploit Modules
    • Targets and Payloads
    • Encoders & Msfvenom: Advanced Exploitation Techniques
    • Database Management in Metasploit
    • Sessions and Jobs
    • Writing and Importing Custom Modules into Metasploit
    • Firewall and IDS/IPS Evasion
  • Password Attacks
    • Remote Password Attacks
    • Windows Local Password Attacks
    • Linux Local Password Attacks
    • Windows Lateral Movement
    • Files & Archives Cracking
    • Password Management
  • Interacting with Common Services
    • Protocol Specific Attacks
Powered by GitBook
On this page
  • Installation and Setup
  • Initial Installation
  • Access Configuration
  • Scan Configuration
  • 1. Basic Scan Setup
  • 2. Discovery Settings
  • 3. Assessment Configuration
  • Advanced Configuration
  • 1. Custom Scan Policies
  • 2. Plugin Management
  • 3. Performance Tuning
  • Scanning Best Practices
  • 1. Pre-Scan Checklist
  • 2. Network Impact Monitoring
  • 3. Risk Mitigation
  • Reporting and Analysis
  • 1. Export Commands
  • 2. Report Structure
  • 3. Report Analysis
  • Troubleshooting Guide
  • 1. Common Issues
  • 2. Performance Issues
  • 3. Debug Commands
  • Security Considerations
  • 1. Scanner Security
  • 2. Target Protection
  • 3. Compliance Integration
  1. Vulnerability Assessment Notes

Nessus Vulnerability Scanner Notes

PreviousVulnerability Assessment NotesNextOpenVAS (GVM) Vulnerability Scanner Notes

Installation and Setup

Initial Installation

# Install Nessus package
dpkg -i Nessus-8.15.1-ubuntu910_amd64.deb

# Start Nessus service
sudo systemctl start nessusd.service

Access Configuration

  • Access web interface: https://localhost:8834

  • Get activation code:

  • Complete initial setup:

    1. Choose "Nessus Essentials" (free version)

    2. Enter activation code

    3. Create admin user

    4. Wait for plugin compilation

Scan Configuration

1. Basic Scan Setup

1. Select "New Scan"
2. Choose scan template:
   - Basic Network Scan (general vulnerability scanning)
   - Discovery Scan (host/port enumeration)
   - Compliance Scan (standards checking)
3. Enter target information:
   - Single IP: 192.168.1.1
   - IP Range: 192.168.1.1-192.168.1.254
   - CIDR: 192.168.1.0/24

2. Discovery Settings

Host Discovery:
- Disable "Scan Fragile Devices" for sensitive systems
- Port scan range options:
  - Default
  - All ports
  - Custom (e.g., "1-1024,1433,3306,3389")

Service Discovery:
- Enable "Probe All Ports" for thorough scanning
- Enable SSL/TLS Checks for certificate validation

3. Assessment Configuration

Web Application Settings:
- Enable web scanning
- Configure user agents
- Add test URLs

Authentication:
- SSH (Linux):
  - Username/Password
  - Public Key
  - Kerberos
- Windows:
  - Domain/Username/Password
  - NTLM hash
  - Kerberos

Advanced Configuration

1. Custom Scan Policies

1. Navigate to "New Policy"
2. Select base template
3. Configure:
   - Scanner settings
   - Credentials
   - Plugins
   - Compliance checks
4. Save under "User Defined" templates

2. Plugin Management

Plugin Rules:
1. Access "Plugin Rules" in Resources
2. Define:
   - Plugin ID
   - Host/IP
   - Action (Hide/Recast)

3. Performance Tuning

Network Settings:
- Max hosts per scan
- Max checks per host
- Network timeout
- Packet rate

Scan Timing:
- Scan window
- Delay between scans
- Timeout period

Scanning Best Practices

1. Pre-Scan Checklist

1. Verify target scope
2. Check network bandwidth
3. Confirm maintenance windows
4. Test credentials
5. Verify firewall rules

2. Network Impact Monitoring

# Install monitoring tool
sudo apt install vnstat

# Monitor network interface
sudo vnstat -l -i eth0

# Expected baseline traffic
# rx: ~332 bit/s    tx: ~332 bit/s

# During scan traffic
# rx: ~307.92 kbit/s    tx: ~380.41 kbit/s

3. Risk Mitigation

1. Enable "Safe Checks"
2. Disable DoS plugins
3. Exclude sensitive systems
4. Schedule during off-peak hours
5. Monitor system resources

Reporting and Analysis

1. Export Commands

# Using Nessus Report Downloader
./nessus_downloader.rb

# Export format options:
- Nessus (.nessus)
- PDF
- HTML
- CSV
- DB

2. Report Structure

Executive Summary:
- Host inventory
- Vulnerability counts
- Severity breakdown
- CVSS scores

Detailed Findings:
- Plugin ID
- CVE references
- CVSS vector
- Remediation steps

3. Report Analysis

Priority Matrix:
1. Critical (CVSS 9.0-10.0)
   - Immediate remediation
   - Daily tracking

2. High (CVSS 7.0-8.9)
   - 7-day remediation
   - Weekly tracking

3. Medium (CVSS 4.0-6.9)
   - 30-day remediation
   - Monthly tracking

4. Low (CVSS 0.1-3.9)
   - 90-day remediation
   - Quarterly tracking

Troubleshooting Guide

1. Common Issues

Scan Failures:
- Check target availability
- Verify credentials
- Review firewall rules
- Monitor resource usage

Authentication Issues:
- Verify account permissions
- Check credential format
- Test network connectivity

2. Performance Issues

Slow Scans:
1. Reduce concurrent checks
2. Adjust network timeout
3. Optimize plugin selection
4. Schedule during off-hours

3. Debug Commands

# Check Nessus service status
sudo systemctl status nessusd

# View Nessus logs
tail -f /opt/nessus/var/nessus/logs/nessusd.messages

# Test network connectivity
nc -vz target_ip port

Security Considerations

1. Scanner Security

1. Keep Nessus updated
2. Use strong credentials
3. Restrict scanner access
4. Monitor scanner logs
5. Regular backup of configurations

2. Target Protection

1. Enable safe checks
2. Test scan configurations
3. Monitor target systems
4. Document exceptions
5. Maintain change control

3. Compliance Integration

1. Map findings to:
   - PCI DSS
   - HIPAA
   - ISO 27001
   - NIST

2. Document:
   - Scan frequencies
   - Exception processes
   - Remediation workflows
Tenable Activation Page