Nessus Introduction
Nessus Introduction
There are a number of security scanners available. Most are vendor specific and charge
by the number of IP addresses it can scan. The most popular alternative to these
scanners is Nessus.
Nessus is designed to automate the testing and discovery of known security problems.
One of the very powerful features of Nessus is its client server technology. Servers can
be placed at various strategic points on a network allowing tests to be conducted from
various points of view.
A central client or multiple distributed clients can control all the servers.
It even runs on MAC OS X and IBM/AIX, but Linux tends to make the installation
simpler. Clients are available for both Windows and UNIX.
These features provide a great deal of flexibility for the penetration tester.
The Nessus server performs the actual testing while the client provides configuration
and reporting functionality.
Features of Nessus
Plug-ins
Each security test is written as an external plugin, written in NASL. Each
NASL plugin can be read and modified, to better understand the results of a
Nessus report.
NASL
The Nessus Security Scanner includes NASL, (Nessus Attack Scripting
Language) a language designed to write security test easily and quickly.
Multiples services
If a host runs the same service twice or more, Nessus will test all of them.
Believe it or not, several scanners on the market still consider that a host can
only run one server type at once.
Overview of the Nessus Assessment Process While running Nessus you are doing a
vulnerability assessment (or audit). This assessment involves three distinct phases.
Scanning
In this phase, Nessus probes a range of addresses on a network to determine which
hosts are alive. One type of probing sends ICMP echo requests to find active hosts, but
does not discount hosts that do not respond - they might be behind a firewall. Port-
scanning can determine which hosts are alive and what ports they have open. This
creates a target set of hosts for use in the next step.
Enumeration
In this phase, Nessus probes network services on each host to obtain banners that
contain software and OS version information. Depending on what is being enumerated,
username and password brute-forcing can also take place here.
Vulnerability Detection
Nessus probes remote services according a list of known vulnerabilities such as input
validation, buffer-overflows, improper configuration, and many more.