|
|
|
Running your first scan using NessusWX
The following is a simple how-to guide for installing, configuring, and running your first vulnerability scan using the NessusWX Windows client. The instructions do not include in depth explanations as it is assumed that you are familiar with benefits of using Nessus and have a general working knowledge of Windows.
As with any software installation, your results may vary depending on the machine operating system and patch levels being used. The installation steps were conducted using of NessusWX 1.4.4 on several Windows operating systems and patch levels including XP, 2000, and 2003 Server to insure accuracy. It is recommended that the installation be conducted using the “admin” account or equivalent to avoid rights issues.
Install NessusWX
- Download and save the self-extracting version of NessusWX for Intel platforms
from http://nessuswx.nessus.org/ to a temp directory on your hard drive. (nessuswx-1.4.4-install.exe, 1413KB in size);
- Double-click NessusWX-1.4.4-install.Exe to start the installation process;
- If using XP SP2 you may be prompted with a warning message that the publisher
could not be verified, click <Run>
- At the "Welcome to the Installation Wizard" screen click <Next>
- At the "License Agreement" screen read the license terms, check "Yes, I agree
with all the terms of this license agreement", click <Next>;
- At the "Destination Folder" screen enter the desired location for NessusWX, or
accept the default of C:Program FilesNessusWX, click <Next>;
- At the "Setup Type" screen select "Binaries Only", or if you wish the source files
included select "Binaries & Source", click <Next>;
- At the "Program Group" screen select the desired program group, or leave at the
default of NessusWX, click <Next>;
- At the "Ready to Install the Program" screen click <Next>;
- At the "Installation Complete" screen click <Ok>.
If the installation process completed successfully, you now have a NessusWX desktop icon and Start/Programs/NessusWX menu listing.
Configuration of NessusWX
Before configuring the NessusWX client, you need some information concerning the Nessus server you will be using. Please contact you Nessus server administrator for assistance if needed.
Nessus server IP: _______________________
Nessus port number: _____________________ (default is 1241)
Max simultaneous hosts: __________________ (default is 16)
Max security checks per host: ______________ (default is 10)
Your Nessus login name: __________________
Your Nessus login password: _______________
Maximum simultaneous hosts, and maximum security checks per host, refers to the number simultaneous scans that will be performed. It is possible to optimize a Nessus server to support more then the default settings and to use a different port. If in this information is not available or unknown use the default values.
Your Nessus Server administrator has the ability to limit what IP range(s) you can scan based on your login name. Speak with your Nessus server administrator and determine what limits, if any, have been established.
- Upon executing NessusWX you will be prompted with the "Settings" screen,
"General" tab,requesting database directory information. By default NessusWX uses C:NessusDB to storescan result. The database location can be a network drive if you wish to store results on a network drive for security purposes. Select the defaults value or change to the desired directory, click <Ok>
- If the directory you selected does not exist, you will be prompted with a
creation message, click <Yes>
- Select "Communications/Connect" menu option
- Change the default Server "Name", from the default 127.0.0.1, to the
desired Nessus server;
- Change the default Server "Port Number", from 1241, to the desired Nessus
server port if needed;
- By default, NessusWX selects TLSv1 as encryption option;
- Select "Authentication by Password" radio button;
- Check save password checkbox;
- Change the default Authentication "Login" value to your Nessus login name;
- Enter your Nessus login name password, click <Connect>
- You will be prompted with New Server Certificate window displaying the
Nessus server certificate information, click <Accept & Save>
If the userid/password information you entered is correct, you will receive a brief message that NessusWX is downloading plugin information. Upon download completion, something similar to the following will be displayed at the bottom of the NessusWX screen:
Using <NTP/1.2>
Connection with the server [xxx.xxx.xxx.xxx] established
xxxx plugins loaded
xxxx preferences received
xxxx rules received
You now have a fully functioning copy of NessusWX installed, have connected to a Nessus Server, and are ready to being performing vulnerability scans.
Before You Scan
Before performing vulnerability scanning, a few cautions and recommendations should be considered:
- Make sure you are acting within your authority. Most companies have strict
policies about who can perform vulnerability scanning and on what equipment. Acting outside your authority with a vulnerability scanner could lead to your dismissal;
- Absent Nessus server based rules that limit what IP ranges you can test, obtain
written permission on what you are and are not permitted to perform vulnerability test on;
- Vulnerability scanning can leave equipment in an unstable state. This is
practically true if performing Denial of Service tests and/or testing systems are very poorly configured. Nessus vulnerability scanning is normally not destructive and rebooting the affected equipment will return it to the correct operational state;
- NessusWX has a selection
for "Safe checks" that disables the most dangerous scripts from executing and instead relies on banners information to determine vulnerability rather than exploiting the real flaw. However, it is still possible to leave equipment in an unstable state;
- If your company uses an intrusion detection system, performing vulnerability
scanning on the network will most likely trigger intrusion alerts. Vulnerability scanning is very "noisy" and easily detected by most intrusion detection systems;
- If you are performing vulnerability scans across the internet verify your ISP will
not object, that your scanning will not trigger their intrusion detection system, and request documentation concerning scanning polices and rules that you must follow;
- Exercise common sense when performing vulnerability scans. For example,
it’s most likely not a good idea to run a Denial of Services test on your core router during normal business hours;
- NEVER SCAN EQUIPMENT THAT YOU ARE NOT EXPRESSLY AUTHORIZED TO SCAN.
Doing so could result in lawsuits, bad press, jail, ISP termination, and unemployment just to name a few. Running a Denial of Services test against your competitor’s web site for example, will most likely result in several unwanted events occurring once you and your company are identified as the cause.
Performing Your First Scan
To perform your first vulnerability scan, you must create a Session (job) outlining the targets and scanning options desired.
- Click menu selection Session/New;
- You will be prompted to enter a session name or accept the default of "Session1".
Enter "First Scan", leave "Define additional properties" checked, click <Create>;
- At the "Session Properties - Test Scan", click the "Targets" tab, then
click <Add>;
- At the "Add Target" screen you have the option of entering a single host, a
subnet, or IP range depending on scanning needs. For our test session, select a single IP address and enter the IP or Host name of your workstation, click <Ok>;
- Click <Apply>.
- Click the "Options" tab:
- Change "Maximum simultaneous" default value if needed;
- Change "Security checks per host" default value if needed;
- "General scan options/Enable plugin dependencies". Nessus uses many plugins
(tests) that require the use of other plugins to operate correctly. Checking this box permits Nessus to automatically enable dependencies as needed. For our test scan, "Enable plugin dependencies" should be checked;
- "General scan options/Do reverse DNS lookups" simply performs a DNS lookup
on the target to determine the host name. For our test scan, check "Do reverse DNS lookups";
- "General scan options/Safe checks". As stated previously, Safe Checks
disables the most dangerous scripts from executing and instead relies on banner information to determine vulnerability rather than exploiting the real flaw. For our test scan, leave "Safe checks" checked;
- "General scan options/Optimize the test" lets Nessus avoid all apparently
irreverent tests. For example, tests will not be conducted for web site unless a web site is detected. For our test scan, leave "Optimize the test" checked;
- "General scan options/Resolve unknown services" will permit Nessus to resolve
any unknown services that may be operating on the system. For our test scan, leave "Resolve unknown services" checked;
- "Path to CGI’s". Nessus has the ability to check for generic CGI vulnerabilities
that may be present. For our test scan, leave "Path to CGI’s" at the default of "/cgi-bin";
- "Interface options" permits you to limit the results that are displayed on the
screen while scanning is occurring. For our test scan, leave both items unchecked to display the maximum amount of information;
- Click <Apply>.
- Click the "Port scan" tab:
- "Port range to scan" permits you to enter the ports Nessus will scan. For our
test scan, we will use the default of "Privileged ports (1-1024)";
- "Port scanners" permits the use of a wide range of port scanners depending
on your needs. For our test scan, leave the default of "Ping the report host" and "tcp connect scan" checked.
- Click <Apply>.
- Click the "Connection" tab will permit you to enter and store specifics about the
Nessus server to be used for the session. Since we are currently connected to a specific Nessus server, no need exists to enter this information for our test scan;
- Click the "Plugins" tab:
- To test for system vulnerability we must enable plugins. Check the "Use
session-specific plugin" checkbox. You will notice that currently "0 plugins currently are selected for execution";
- Click the "Select plugins" button to display the "Plugin List" screen. For our
test scan, click the "Enable All" button, click <Yes>, when prompted with "Do you wish to enable all port scanners as well", click <Close>. You will notice that 2400 or so plugins are now selected for execution;
- Click <Apply>.
- Click the "Comments" tab and input any remarks you have concerning this session
or its settings, then click <Ok> to save your Session;
To execute the Session, right-click on the icon and then select <Execute>. When prompted at the "Execute Session" screen simply click Execute and vulnerability scanning will commence.
Closing
Take some time, experiment, and learn what NessusWX and Nessus have to offer. Patch systems and rescan to verify vulnerability have been closed. Using NessusWX and Nessus will permit you to find system vulnerabilities before hackers and virus/worm writers have opportunity to do it for you.
About the Author
Lew Newlin is CTO of Information Solutions, Inc. that operates SiteRecon.com. SiteRecon specializes in security, email monitoring, and web site monitoring for Internet service providers and businesses.
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|