Introduction
In today's interconnected digital world, ensuring the security of our systems is paramount. Vulnerability scanning is a crucial step in identifying potential weaknesses that attackers could exploit. Nessus, a widely used vulnerability scanner, allows us to systematically assess and mitigate these risks.
Prerequisites
Before diving into the vulnerability scanning process, ensure you have the following setup:
A vulnerable machine (Metasploitable 2 VM in this case) installed in VMware.
Kali Linux VM with Nessus installed.
Network connectivity between the VMs.
Step 1: Set Up Nessus
1. Download the Nessus package for Debian on the Nessus website and make sure you set the Platform to Linux-Debian-amd64. ---> Download
2. When it's finished downloading, open your Linux terminal and navigate to the location you downloaded the Nessus file to.
3. Install Nessus using this command:
sudo dpkg -i Nessus-*
4. Start the Nessus service with this command:
sudo systemctl start nessusd
5. On your browser, go to https://<kali-linux-IP>:8834/. It would show a warning page.
Nessus website showing a warning page
6. Click on Advanced. Then, click on Accept Risk and Continue.
7. Choose the Nessus Product you prefer. If you want the free version of Nessus, click on Nessus Essentials.
Nessus Packages
8. Enter your name and email address to receive an activation code by email. Paste the activation code into the space provided and choose a username and password.
9. Allow Nessus to download the necessary plugins.
10. Once the plugin downloads have completed, you can start using the Nessus service.
Step 2: Access Nessus Web Interface
Start Nessus on your Kali Linux VM when vm starts up
sudo systemctl enable nessusd
Access the Nessus web interface via https://localhost:8834 and log in with your credentials.
Step 3: Nessus Dashboard Overview
Dashboard Overview: Upon logging in, you will land on the Nessus dashboard. Here’s a breakdown of key components:
Step 4: Basic Scan Configuration
Navigate to the "Scans" tab and click on "New Scan."
Choose the "Basic Network Scan" template.
Enter the IP of your Metasploitable 2 VM as the target or any other target you may have selected.
Let's explore the basic network scan settings a bit. First on the general category under basic tab we can set the name, description, which folder to save, and the target IP or IP range, we can also upload target files.
On the discovery page we can see different scan types mostly port scan type as it is a basic scan.
On assessment page we can set scan types for web vulnerability related stuff.
The report page shows how the end report will be presented.
And lastly, the advanced page show in which rate the scan will take place.
After exploring everything come back to basic page and here, we can either save the scan for later run or we can start then scan then and there. Save the scan configuration and start the scan.
Step 4: Run the Scan
Run the Scan:
In the "Scans" tab, locate the scan you just created.
Click on the "Play" button (▶) to start the scan.
Monitor the Scan:
Nessus will begin scanning the Metasploitable 2 VM. The duration will vary depending on the network and the configuration.
Step 5: Analyze the Results
View Scan Results:
Step 6: Differences between Basic and Advanced scan
The main differences we can see between the basic and advanced scan is in the new scan configuration. We can find it in discovery page. There are different types of discovery sections. As we can see there are four categories like host, port, service and identity.