πŸ”Vulnerability Assessment

Overview

Vulnerability Assessment is a critical phase in penetration testing that identifies security weaknesses in systems, networks, and applications. This guide focuses on Nessus Professional, the industry-standard vulnerability scanner, with emphasis on credentialed scanning and advanced configuration.

Key Objectives:

  • Identify known vulnerabilities (CVEs)

  • Assess security misconfigurations

  • Evaluate authentication mechanisms

  • Prioritize security risks by severity

  • Generate comprehensive reports for remediation


Nessus Professional

Why Nessus?

Industry Standard Features:

  • 145,973+ Plugins - Covers 58,391 CVE IDs and 30,696 Bugtraq IDs

  • NASL Scripting - Nessus Attack Scripting Language for custom checks

  • Credentialed Scanning - Deep system analysis with legitimate access

  • Professional Reporting - Executive and technical reports

  • Continuous Updates - Daily plugin updates from Tenable

  • Compliance Scanning - PCI DSS, HIPAA, SOX, CIS benchmarks

Installation and Setup

Initial Configuration:

  1. Create admin account with strong credentials

  2. Enter activation code (Professional license required)

  3. Download plugins (automatic update process)

  4. Configure scan policies for different scenarios


Scan Policies

Overview

Scan policies are customized scan configurations that can be saved, reused, and shared. They allow penetration testers to create targeted scans for specific scenarios while maintaining consistency across assessments.

Benefits:

  • Consistency - Standardized scanning approach

  • Efficiency - Pre-configured settings for common scenarios

  • Customization - Tailored scans for specific environments

  • Portability - Export/import between Nessus scanners

Creating Custom Scan Policies

Step 1: Policy Creation

Step 2: Basic Settings

Step 3: Advanced Settings

Specialized Scan Policies

Stealth Scan Policy

Web Application Focused Policy

Internal Network Policy


Nessus Plugins

Plugin Architecture

Nessus Attack Scripting Language (NASL):

  • Custom vulnerability checks written in specialized language

  • Severity ratings: Critical, High, Medium, Low, Info

  • Vulnerability intelligence: CVE mapping, exploit availability

  • Remediation guidance: Specific steps to fix identified issues

Plugin Families

Family
Description
Use Case

Web Servers

HTTP/HTTPS server vulnerabilities

Web application testing

Windows

Windows OS and service vulnerabilities

Windows infrastructure

Backdoors

Known backdoor and malware detection

Compromise assessment

Databases

Database-specific vulnerabilities

Database security testing

General

Miscellaneous vulnerability checks

Comprehensive scanning

Denial of Service

DoS vulnerability testing

Availability testing

Default Unix Accounts

Default account detection

Configuration assessment

SCADA

Industrial control system security

Critical infrastructure

Plugin Management

Plugin Rules for False Positive Management

Common False Positive Exclusions


Credentialed Scanning

Overview

Credentialed scanning provides legitimate authenticated access to target systems, enabling Nessus to perform comprehensive security assessments that are impossible with network-only scanning.

Benefits:

  • Deep system analysis - Local security configurations

  • Patch level assessment - Missing security updates

  • Configuration auditing - Security policy compliance

  • Local privilege escalation - Misconfigured permissions

  • Malware detection - File system analysis

Authentication Methods

SSH Authentication (Linux/Unix)

SSH Key Generation

Windows Authentication

Kerberos Authentication

Database Credentialed Scanning

Microsoft SQL Server

MySQL/MariaDB

PostgreSQL

Oracle Database

Web Application Authentication

HTTP Basic Authentication

HTTP Form-Based Authentication

HTTP Header Authentication

Verification of Credentialed Access

Successful Authentication Indicators

Authentication Failure Troubleshooting


HTB Academy Lab Configuration

Lab Credentials

Linux Systems

Windows Systems

Pre-configured Scans

Note: HTB Academy provides pre-configured credentialed scans to save time during the lab exercises. These scans demonstrate:

  1. Linux Credentialed Scan - Using htb-student_adm account

  2. Windows Credentialed Scan - Using administrator account

  3. Comparison Analysis - Credentialed vs. non-credentialed results


Advanced Scanning Techniques

Compliance Scanning

PCI DSS Compliance

CIS Benchmarks

Malware Detection

Patch Management Assessment


Scan Results Analysis

Vulnerability Prioritization

Risk-Based Analysis

CVSS Score Integration

False Positive Management

Common False Positives

Verification Methods


Reporting and Documentation

Executive Summary Report

Technical Report

Custom Report Templates

Compliance Reports


Integration with CPTS Methodology

Workflow Integration

Phase 1: Post-Enumeration Assessment

Phase 2: Vulnerability Scanning

Phase 3: Results Correlation

Exploitation Planning


Best Practices

Scanning Ethics and Safety

Performance Optimization

Credential Security

Quality Assurance


Tools Summary

Tool
Purpose
Use Case

Nessus Professional

Comprehensive vulnerability scanning

Primary vulnerability assessment

Nessus Essentials

Limited free version

Small environment testing

Tenable.io

Cloud-based vulnerability management

Enterprise continuous monitoring

Nessus Agent

Continuous monitoring

Internal asset assessment


Key Takeaways

  1. Credentialed scanning provides significantly more comprehensive results than network-only scans

  2. Custom scan policies enable consistent and targeted vulnerability assessments

  3. Plugin management is essential for reducing false positives and improving accuracy

  4. Authentication verification ensures credentialed scans are functioning properly

  5. Risk-based prioritization focuses remediation efforts on the most critical vulnerabilities

  6. Integration with enumeration phases provides comprehensive security assessment

  7. Proper documentation supports effective vulnerability management programs


References

  • Tenable Nessus User Guide

  • HTB Academy: Vulnerability Assessment

  • NIST SP 800-40: Guide to Enterprise Patch Management

  • OWASP Vulnerability Scanning Guide

  • PCI DSS Vulnerability Scanning Procedures

  • SANS Vulnerability Assessment Methodologies

Last updated