{"id":126,"date":"2022-04-13T02:10:15","date_gmt":"2022-04-13T02:10:15","guid":{"rendered":"https:\/\/cyberlorenzo.tech\/?p=126"},"modified":"2022-05-13T04:09:41","modified_gmt":"2022-05-13T04:09:41","slug":"vulnerability-scanning-with-nessus-credentialed-scans-vs-un-credentialed","status":"publish","type":"post","link":"https:\/\/cyberlorenzo.tech\/?p=126","title":{"rendered":"Vulnerability scanning with Nessus (Credentialed scans vs un-credentialed)"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<p>Nessus is one of the most prominent vulnerability scanners in the industry at this time. In this lab, I will be conducting a basic vulnerability scan against a VM with an old FireFox version  installed on the machine. Nessus is fairly simple scanner to use so this will be a rather short demonstration. Let&#8217;s get right to the meat and potatoes. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Here we went ahead and entered the IP address into Nessus to run a host discovery.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"714\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-17-1-1024x714.png\" alt=\"\" class=\"wp-image-127\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-17-1-1024x714.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-17-1-300x209.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-17-1-768x536.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-17-1-1536x1071.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-17-1.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Next we are going to run a basic network scan on our host (uncredentialed).  There are 5 threat levels Nessus uses : info, low, medium, high and critical. The VM in this project has one medium level threat. By clicking on it you can see more information about the vulnerability and how to remediate it if you wish to do so. <\/p>\n\n\n\n<p>Certain vulnerabilities will not be addressed as risk acceptance varies from organization to organization. <\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"337\" data-id=\"128\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-19-1024x337.png\" alt=\"\" class=\"wp-image-128\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-19-1024x337.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-19-300x99.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-19-768x252.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-19-1536x505.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-19-2048x673.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Here we are about to install a old version of FireFox and see what Nessus uncovers for us. I also enabled a CREDENTIALED scan. This can be done by going to the configure tab and entering the username and password of the machine. This will allow Nessus access to the registry on the VM which will allow for a more thorough scan. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-25-1-1024x241.png\" alt=\"\" class=\"wp-image-130\" width=\"979\" height=\"230\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-25-1-1024x241.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-25-1-300x71.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-25-1-768x181.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-25-1-1536x361.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-25-1-2048x482.png 2048w\" sizes=\"auto, (max-width: 979px) 100vw, 979px\" \/><\/figure>\n\n\n\n<p>Wow! Look at all of those new vulnerabilities, let&#8217;s see where most of them are from. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>As expected, we have multiple critical vulnerabilities from the version of FireFox we installed on the VM. This can be easily remediated by updating FireFox and then scanning the machine again to ensure that there are not anymore vulnerabilities. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-23-1024x586.png\" alt=\"\" class=\"wp-image-131\" srcset=\"https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-23-1024x586.png 1024w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-23-300x172.png 300w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-23-768x439.png 768w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-23-1536x879.png 1536w, https:\/\/cyberlorenzo.tech\/wp-content\/uploads\/2022\/04\/Screenshot-23-2048x1172.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nessus is one of the most prominent vulnerability scanners in the industry at this time. In this lab, I will be conducting a basic vulnerability scan against a VM with an old FireFox version installed on the machine. Nessus is fairly simple scanner to use so this will be a rather short demonstration. Let&#8217;s get [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"saved_in_kubio":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-126","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-project-iii"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=126"}],"version-history":[{"count":4,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts\/126\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/posts\/126\/revisions\/257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=\/wp\/v2\/media\/222"}],"wp:attachment":[{"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberlorenzo.tech\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}