{"id":45,"date":"2021-02-25T16:32:39","date_gmt":"2021-02-25T16:32:39","guid":{"rendered":"https:\/\/cas.cybercop-training.ch\/?page_id=45"},"modified":"2021-05-31T14:22:44","modified_gmt":"2021-05-31T14:22:44","slug":"nessus-vulnerability-scanning","status":"publish","type":"page","link":"https:\/\/cas.cybercop-training.ch\/index.php\/nessus-vulnerability-scanning\/","title":{"rendered":"Nessus Vulnerability Scanning"},"content":{"rendered":"<h2>1. Task description<\/h2>\n<p>Nessus is a powerful network &amp; vulnerability scanner developed by Tenable, Inc.. In this challenge, you will get access to an instance of Nessus running in the Hacking Lab environment.<br \/>\nAfter learning howto import a previous scan in nessus, you did learn howto perform your own scan against a target. Please answer the following questions:<\/p>\n<ol>\n<li>Describe how you would configure a username and password when testing an ftp service?<\/li>\n<li>Describe how you would configure a domain when testing an Active Directory<\/li>\n<li>Describe how you would configure the portscan prior the vulnerability scan<\/li>\n<li>Is is possible to run a brute-force attack against an ssh service?<\/li>\n<\/ol>\n<h2>2. Answers<\/h2>\n<ol>\n<li>I would test if anonymous login is allowed. When you perform a new scan with nessus, you&#8217;ll find a template for that under credentials.<br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/nessus_1.png\" alt=\"\" \/><\/li>\n<li>Under credentials there is also a template for windows. Here you can enter your active directory credentials.<br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/nessus_2.png\" alt=\"\" \/><\/li>\n<li>I&#8217;d use the default SYN Scan with soft detection enabled.<br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/nessus_3.png\" alt=\"\" \/><\/li>\n<li>I didn&#8217;t find any option for that. By default setting it&#8217;s not possible, but it works if hydra is installed on the same system.<br \/>\n<img decoding=\"async\" src=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/nessus_4.png\" alt=\"\" \/><\/li>\n<\/ol>\n<h3>Brute Force Options<\/h3>\n<blockquote>\n<p>The Brute Force tab specifies how the scanner tests for information against SCADA systems.<\/p>\n<p>Additionally, if Hydra is installed on the same host as a Nessus server linked to SecurityCenter, the Hydra section will be enabled. Hydra extends brute force login testing for the following services: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec, Rlogin, Rsh, S7-300, SAP\/R3, SIP, SMB, SMTP, SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2), Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.<\/p>\n<\/blockquote>\n<p>PDF Report<br \/>\n<a href=\"https:\/\/cas.cybercop-training.ch\/wp-content\/uploads\/2021\/02\/nessus_basics1.pdf\" class=\"mtli_attachment mtli_pdf\" title=\"nessus_basics#1\">nessus_basics#1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Task description Nessus is a powerful network &amp; vulnerability scanner developed by Tenable, Inc.. In this challenge, you will get access to an instance of Nessus running in the Hacking Lab environment. After learning howto import a previous scan in nessus, you did learn howto perform your own scan against a target. Please answer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-45","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":3,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages\/45\/revisions"}],"predecessor-version":[{"id":1343,"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/pages\/45\/revisions\/1343"}],"wp:attachment":[{"href":"https:\/\/cas.cybercop-training.ch\/index.php\/wp-json\/wp\/v2\/media?parent=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}