Part 5.1 - Nessus

Video Activity

This video and the next three explore the Metasploit Nessus scanner. It's useful for uncovering potential vulnerabilities with web applications running on a target host. Dean starts out by demonstrating the basics of Nessus, which can be downloaded from the tenable website. There are several paid versions along with a free, home version. You should...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
5 hours 38 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Description

This video and the next three explore the Metasploit Nessus scanner. It's useful for uncovering potential vulnerabilities with web applications running on a target host. Dean starts out by demonstrating the basics of Nessus, which can be downloaded from the tenable website. There are several paid versions along with a free, home version. You should download and install the AMD64 distro for Kali. There are two modes for running Nessus: from the Metasploitable framework using the CLI or web-based from within a web browser. Dean runs through some basic Nessus commands and configuration options. The industry standard for vulnerability, configuration and compliance assessments used by more than one million users across the globe. Nessus prevents network attacks by identifying the vulnerabilities and configuration issues that hackers use to penetrate your network. Download Nessus from Tenable to follow along the with the course! Click below to download your free trial of Learn more about Tenable on their Cybrary channel. Click below to follow for all the latest updates:

Video Transcription
00:03
>> Alright, I'm going ahead and clear my screen.
00:03
I'm going to going to double-check to see
00:03
if my Nessus service.
00:03
I do I serve a nessusd status.
00:03
I can see that it is running, so that's good.
00:03
What I could do is to also try to
00:03
connect to it from my web browser.
00:03
Now I have installed
00:03
Nessus by downloading it from Tenable.
00:03
You do have to register with them,
00:03
we'll go to the website really quick.
00:03
Spelled it wrong, sorry about that.
00:03
If we go to our product section,
00:03
we can see there's a download link for Nessus.
00:03
What I've downloaded is the home version.
00:03
This one is free, it doesn't expire.
00:03
You can certainly pay for
00:03
the features that come with
00:03
more the enterprise solution or
00:03
even a cloud-based solution.
00:03
You simply click that "Download" button.
00:03
Then for Kali Linux,
00:03
you want to pick the AMD 64 distribution,
00:03
and it comes in a .deb file.
00:03
The instructions for installation are pretty simple.
00:03
I think you just do a D package command
00:03
in order to install Nessus.
00:03
D package-I. I've already
00:03
gotten Nessus installed from previously to
00:03
my downloads directory and so I can run a D
00:03
package-I and begin the process
00:03
with this file here.
00:03
I've already installed it,
00:03
so I'm not going to repeat that,
00:03
but that's how you get to that point.
00:03
Once it's installed, Nessus will now run as a service.
00:03
One of those things you can do as a
00:03
>> service-status-all and we can just do
00:03
>> a grep for Nessus. There it is nessusd.
00:03
The plus sign means that it's running.
00:03
There's various ways to determine
00:03
if your Nessus environment is ready to go.
00:03
We have two options we can try to connect to
00:03
Nessus from the Metasploit framework.
00:03
I was trying that earlier
00:03
and I had a little bit of trouble with it.
00:03
We'll give it another shot.
00:03
But if that doesn't work, we know we still
00:03
have the web-based option.
00:03
Let's go back to our Metasploit Framework [NOISE].
00:03
Let's have a look at a banner,
00:03
that a nice banner today.
00:03
First I'm going to load
00:03
Nessus and then I've got nessus_help,
00:03
to give me an idea of what my possibilities are.
00:03
First thing I'm going to try to do is connect to
00:03
my Nessus server. See if that works.
00:03
If it doesn't, then we'll just go
00:03
to Nessus as the web version.
00:03
But at least wanted to show this part of it.
00:03
We can log into a Nessus server
00:03
over if you've got a different username and password,
00:03
you can do things like give
00:03
a list of of the folders on the Nessus installation.
00:03
I can do a scan from
00:03
all the IP addresses that are in my hosts table.
00:03
I can run reports on the host,
00:03
I can run reports on vulnerabilities.
00:03
All of this within the framework once you
00:03
get the connectivity established.
00:03
I could also get a list of my scans.
00:03
Pause a scan, stop a scan, resume a scan.
00:03
I'm going to list all of my plugins.
00:03
I can show my Nessus users once I'm connected.
00:03
All right, let's see if we can
00:03
get the connection to work.
00:03
[NOISE] Nessus_connect -h. It's
00:03
saying I have to use
00:03
username: password and host name: port.
00:03
Then I either specify SSL verify or SSL ignore.
00:03
You'll notice that we are connecting with SSL.
00:03
I'm going to try the SSL option first.
00:03
We'll see if this works,
00:03
[NOISE] what I'm using is
00:03
the [NOISE] credentials that I created when I
00:03
built [NOISE] this instance
00:03
or when I installed this instance of Nessus.
00:03
I'm going to my host.
00:03
It's on Kali, so it's 131 port 8834,
00:03
then I want to do SSL verifying.
00:03
Now, that didn't work, certificate verify failed.
00:03
Let me see if I can do it
00:03
>> while ignoring the certificate.
00:03
>> No, what's interesting though is it's trying
00:03
to connect to CK Nessus.
00:03
It says as admin,
00:03
but it's still giving me a little prefix
00:03
on the address that it makes you wonder
00:03
if there's something else.
00:03
[NOISE] I'm going to leave the port off,
00:03
maybe the port is the problem.
00:03
No, same thing. Okay, well,
00:03
for the sake of moving along with the course,
00:03
we're going to just leave this as is.
00:03
There's probably something that
00:03
needs to be done that's not in place.
00:03
This connectivity is built here
00:03
for being able to do your scans from
00:03
within the framework and
00:03
not having to break out to use a separate tool.
00:03
That being said,
00:03
why don't we get logged into
00:03
Nessus and have a look around.
00:03
[NOISE]
Up Next