Video - Scanning for Vulnerabilities Using Nessus

Ethical Hacking - A Hands-On Approach to Ethical Hacking Scanning for Vulnerabilities Using NESSUS
11 minutes
Share the link to this page
You need to have access to the item to view this lesson.
One-time Fee
List Price:  $139.99
You save:  $40
List Price:  €128.67
You save:  €36.76
List Price:  £110.19
You save:  £31.48
List Price:  CA$190.60
You save:  CA$54.46
List Price:  A$208.90
You save:  A$59.69
List Price:  S$188.42
You save:  S$53.84
List Price:  HK$1,092.29
You save:  HK$312.10
CHF 90.89
List Price:  CHF 127.25
You save:  CHF 36.36
NOK kr1,073.95
List Price:  NOK kr1,503.58
You save:  NOK kr429.62
DKK kr686.39
List Price:  DKK kr960.97
You save:  DKK kr274.58
List Price:  NZ$228.20
You save:  NZ$65.20
List Price:  د.إ514.18
You save:  د.إ146.92
List Price:  ৳16,391.62
You save:  ৳4,683.65
List Price:  ₹11,661.24
You save:  ₹3,332.02
List Price:  RM656.20
You save:  RM187.50
List Price:  ₦205,785.30
You save:  ₦58,800
List Price:  ₨38,789.74
You save:  ₨11,083.57
List Price:  ฿5,074.35
You save:  ฿1,449.91
List Price:  ₺4,513.75
You save:  ₺1,289.73
List Price:  B$714.59
You save:  B$204.18
List Price:  R2,530.23
You save:  R722.97
List Price:  Лв251.81
You save:  Лв71.95
List Price:  ₩189,601.05
You save:  ₩54,175.60
List Price:  ₪518.60
You save:  ₪148.18
List Price:  ₱8,079.59
You save:  ₱2,308.62
List Price:  ¥21,792.94
You save:  ¥6,227
List Price:  MX$2,325.03
You save:  MX$664.34
List Price:  QR507.87
You save:  QR145.11
List Price:  P1,896.68
You save:  P541.94
List Price:  KSh18,338.69
You save:  KSh5,240
List Price:  E£6,566.93
You save:  E£1,876.40
List Price:  ብር8,018.62
You save:  ብር2,291.20
List Price:  Kz118,629.90
You save:  Kz33,896.68
List Price:  CLP$125,220.73
You save:  CLP$35,779.90
List Price:  CN¥1,011.17
You save:  CN¥288.92
List Price:  RD$8,157.46
You save:  RD$2,330.87
List Price:  DA18,810.98
You save:  DA5,374.95
List Price:  FJ$311.92
You save:  FJ$89.12
List Price:  Q1,087.56
You save:  Q310.75
List Price:  GY$29,285.87
You save:  GY$8,367.99
ISK kr13,827.61
List Price:  ISK kr19,359.21
You save:  ISK kr5,531.60
List Price:  DH1,386.51
You save:  DH396.17
List Price:  L2,464.07
You save:  L704.07
List Price:  ден7,916.55
You save:  ден2,262.03
List Price:  MOP$1,124.95
You save:  MOP$321.43
List Price:  N$2,547.77
You save:  N$727.98
List Price:  C$5,144.63
You save:  C$1,470
List Price:  रु18,661.67
You save:  रु5,332.28
List Price:  S/520.05
You save:  S/148.59
List Price:  K543.23
You save:  K155.22
List Price:  SAR524.96
You save:  SAR150
List Price:  ZK3,554.51
You save:  ZK1,015.64
List Price:  L640.62
You save:  L183.04
List Price:  Kč3,180.29
You save:  Kč908.72
List Price:  Ft49,855.26
You save:  Ft14,245.38
SEK kr1,071.59
List Price:  SEK kr1,500.27
You save:  SEK kr428.67
List Price:  ARS$124,136.13
You save:  ARS$35,470
List Price:  Bs967.19
You save:  Bs276.36
List Price:  COP$532,965.46
You save:  COP$152,286.72
List Price:  ₡71,639.71
You save:  ₡20,469.95
List Price:  L3,448
You save:  L985.21
List Price:  ₲1,048,812.96
You save:  ₲299,682.25
List Price:  $U5,395.05
You save:  $U1,541.55
List Price:  zł548.83
You save:  zł156.82
Already have an account? Log In


Greetings in initial video presentation, we're going to see how we go about conducting a vulnerability scan using nessus. We're going to pick up where our last lab left off. And that's where we installed nessus as a container up inside of Docker, to clear out my cache and to get a fresh install of Kali, I have rebooted. So I'm going to have to go up inside of Docker, find an image for nessus, I'm going to have to reattach it so that we can get into the web interface. And we're going to do this by going up and we're going to type in Docker space, PS space dash, small letter A, I'm gonna go ahead and hit Enter. And you're gonna see just a moment when I go fullscreen, that we do have our nessus image currently installed, and this is the container ID that it uses.

So I'm gonna go ahead and copy that. I'm going to go down here and I'm gonna use my up arrow. And we're going to go ahead and find that previous command that we use in There it is. So it's already got everything that we need and that is Docker space start space dash dash attach, followed by the container ID. And you saw how I got that, I had to show the containers that were present inside of Docker. And then I was able to find that container ID, I'm going to go ahead and hit enter.

I won't be able to see this terminal refresh, I'm gonna have to close out my terminal, I'm gonna have to open up a fresh one. And we're going to have to go back in and use the Docker command to show currently what containers are up inside of Docker. So I've typed in again, doctors face to face dash small letter A. Now I'm going to go ahead and make this full screen again and you'll see that it is now up and it is running and has been for 42 seconds. We cannot close out the terminal. And I'm going to open up my browser.

Our browser has opened up and I've gone up into the address bar and I've typed In the URL to access the nessus web interface. Now remember, this is a few TPS. So I've got to type that in along with the four slash four slash localhost colon, the port number that NASA needs to use, which is 8834. Now, don't panic when you see that it's compiling plugins. This is what it's going to do before, it allows us to go ahead and have access to begin our first scan. Took my machine about five to seven minutes to compile those plugins.

So do Be patient when you log on to do your first scan. So I'm going to go ahead and type in my username and password. You can tell Firefox to go ahead and remember your username and password that will log you in just a little bit quicker. So once we have logged into nessus, we are presented with the my scans page. Now to get started, we have to create a new scan. So we're going to go over here to the right, we're going to click on the new Scan button.

From here, you'll see that there are a number of scanning templates that you can use. These are already pre configured. And if you want to look for a particular type of scan, you probably find it in here. And now these are all configurable, and there are other nessus templates that you can actually download from the internet for other things that you might have running on your network. So let's go ahead and click on the Advanced scan. As I previously stated, these scanning templates are already pre configured, there are actually a profile of the most common settings that you would find for that particular template.

Now in this case, we're using the advanced scan template. So all of the settings have already been configured for us. Now what we have to do next is go down here to where it says targets and we have to type in the IP address for the range that we want nessus to scan, we're going to need to get our network range. So to get this, I'm going to go ahead and minimize my nessus window and I'm going to open up a terminal. And that's the terminal window. I'm going to type in if config to check to see what the IP address is for this particular machine.

So I'm going to type in ifconfig. And I'm going to scroll back up to the top and I'm going to look for my Ethernet zero adapter. My Ethernet zero is configured for the network 192 dot 168 dot zero, and it has been assigned a host IP of 30. I'm gonna go ahead and close this out. I'm gonna go ahead and maximize my window here for nessus. And I'm going to type in 192 dot 168 dot zero dot one.

And I'm going to scan the network range all the way up to 254. Now that To every possible IP address that is on this network, scroll on down here to the bottom. And we're going to click on Save, I can give this scan a friendly name, I'm going to call it test, scroll on back down. And I'm going to pull down this window here. And I'm going to select launch. It's going to take a few minutes for NASA's to set itself up and go out and scan your local area network.

And as it does, you're going to see that there's going to be some information that gets updated. You can click on the name of your scan anytime you want. And you can go look at the results. So I'm going to go ahead and launch over to the next page. And we're going to see that the test scan currently has no results. So let's give it some time.

So as the scan results come in, you'll be able to see the IP address of the machine and over to the right you'll be able to get a great Out of exactly what vulnerabilities are currently present. So you can see that they are color coded so red is critical. The orange is going to be high yellow is medium and then we have low and info. Right now, all we have showing for this particular IP address are two information, informational messages. So you can click on the scan results, and you can get more information about exactly what those informational messages are or the critical or the high or whatever vulnerability has been discovered. So after eight minutes, my nessa scan has completed.

And I want to remind everyone that when you type in that IP address for your networking range to scan, make sure that you don't have any spaces between the dash. So it identified the following machines on my network and I can go in and I can look at the results. Let's look at the medium. She was going on in here. See SMB signing not required SSL certificate cannot be trusted, wrong hostname, SSL, self signed certificate, it goes on and on, then we get into the informational messages. So you can see that you can get a lot of information here.

But if we click on any of these findings, for instance, I'm going to go in here, you can get all the information about this particular vulnerability. And then you can also find ways to mitigate it. All right, so you go over here you can find all the information about when it was found and discovered and all that fun stuff. And you can scroll on down and you can get some information about the port that it runs on and how it was discovered. And you can also see all the different articles and the findings from nessus and Microsoft comm You can see all these different organizations have something to say about this particular vulnerability. If you need to get back, just hit the back arrow, and you're back to where you were.

Now, again, these results will vary. But this is actually a pretty cool thing. Now, if you're on a real network, or you got routers, and you've got firewalls, and you've got all the servers, and you've got all that fun stuff to scan, you're going to see a lot of interesting stuff in here. And that's going to tell you exactly where you can begin to do your vulnerability analysis. So if you happen to get lucky and find some criticals or highs on a client's network, not your own, then you're going to be able to actually do some actual pen testing. And again, when those results show up, inside of the scan results, you just click on, it's going to tell you exactly what you need to know to be able to actually exploit that particular vulnerability.

So when we go into a client, we're usually have a pelican case. And inside that Pelican case, we're going to have at least five or six different laptops and each laptop is going to be configured with Ubuntu, and then move on to is going to have all these different tools installed on it, such as nessus. So you can see how we install the container for nessus. Using Kali Well, we can do the same thing with Ubuntu. And I can have all those tools available to me on Ubuntu. Now, that's because a lot of clients will get a little upset with you, if you bring in Kali or some of these other hacking suites.

So we normally build a clean install of Ubuntu, make sure it's updated. Then we install our container for nessus or open bass or whatever it is or creating a container for that usually puts the client At ease, because when you walk into a bank or you walk into someplace where they security's really tough, they're going to look at your laptops. So make sure that you've got everything dress, right dress and don't think that you're going to bring your Apple machine or your Windows laptop onto somebody's work network, because that's not going to happen. Nobody's going to allow anybody to come in off of the street and just drop a laptop onto their network and begin scanning. That's because Windows is vulnerable. That's why it has a virus scanner.

Same thing with Apple. We use Linux, and we use Linux exclusively for pen testing. So that's going to cover this short video presentation on how we go about conducting a nessus scan on our network. So if you have any concerns or questions about any of the material that was covered in this short video presentation, don't hesitate to reach out and contact your instructor and I'll see you in my next video.

Sign Up


Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.