Nessus Scan
Last updated
Last updated
A new Nessus scan can be configured by clicking New Scan
, and selecting a scan type. Scan templates fall into three categories: Discovery
, Vulnerabilities
, and Compliance
.
Here we have options for a basic Host Discovery
scan to identify live hosts/open ports or a variety of scan types such as the Basic Network Scan
, Advanced Scan
, Malware Scan
, Web Application Tests
, as well as scans targeted at specific CVEs and audit & compliance standards. A description of each scan type can be found .
For the purposes of this exercise, we will choose the Basic Network Scan
option, and we can enter our targets:
In the Discovery
section, under Host Discovery
, we're presented with the option to enable scanning for fragile devices. Scanning devices such as network printers often result in them printing out reams of paper with garbage text, leaving the devices unusable. We can leave this setting disabled:
In Port Scanning
, we can choose whether to scan common ports, all ports, or a self-defined range, depending on our requirements:
Within the Service Discovery
subsection, the Probe all ports to find services
option is selected by default. It's possible that a poorly designed application or service could crash as a result of this probing, but most applications should be robust enough to handle this. Searching for SSL/TLS services is also enabled by default on a custom scan, and Nessus can additionally be instructed to identify expiring and revoked certificates.
Under the Assessment
category, web application scanning can also be enabled if required, and a custom user agent and various other web application scanning options can be specified (e.g., a URL for Remote File Inclusion (RFI) testing):
If desired, Nessus can attempt to authenticate against discovered applications and services using provided credentials (if running a credentialed scan), or else can perform a brute-force attack with the provided username and password lists:
User enumeration can also be performed using various techniques, such as RID Brute Forcing:
If we opt to perform RID Brute Forcing, we can set the starting and ending UIDs for both domain and local user accounts:
On the Advanced
tab, safe checks are enabled by default. This prevents Nessus from running checks that may negatively impact the target device or network. We can also choose to slow or throttle the scan if Nessus detects any network congestion, stop attempting to scan any hosts that become unresponsive, and even choose to have Nessus scan our target IP list in random order: