πVulnerability Assessment
Overview
Vulnerability Assessment is a critical phase in penetration testing that identifies security weaknesses in systems, networks, and applications. This guide focuses on Nessus Professional, the industry-standard vulnerability scanner, with emphasis on credentialed scanning and advanced configuration.
Key Objectives:
Identify known vulnerabilities (CVEs)
Assess security misconfigurations
Evaluate authentication mechanisms
Prioritize security risks by severity
Generate comprehensive reports for remediation
Nessus Professional
Why Nessus?
Industry Standard Features:
145,973+ Plugins - Covers 58,391 CVE IDs and 30,696 Bugtraq IDs
NASL Scripting - Nessus Attack Scripting Language for custom checks
Credentialed Scanning - Deep system analysis with legitimate access
Professional Reporting - Executive and technical reports
Continuous Updates - Daily plugin updates from Tenable
Compliance Scanning - PCI DSS, HIPAA, SOX, CIS benchmarks
Installation and Setup
Initial Configuration:
Create admin account with strong credentials
Enter activation code (Professional license required)
Download plugins (automatic update process)
Configure scan policies for different scenarios
Scan Policies
Overview
Scan policies are customized scan configurations that can be saved, reused, and shared. They allow penetration testers to create targeted scans for specific scenarios while maintaining consistency across assessments.
Benefits:
Consistency - Standardized scanning approach
Efficiency - Pre-configured settings for common scenarios
Customization - Tailored scans for specific environments
Portability - Export/import between Nessus scanners
Creating Custom Scan Policies
Step 1: Policy Creation
Step 2: Basic Settings
Step 3: Advanced Settings
Specialized Scan Policies
Stealth Scan Policy
Web Application Focused Policy
Internal Network Policy
Nessus Plugins
Plugin Architecture
Nessus Attack Scripting Language (NASL):
Custom vulnerability checks written in specialized language
Severity ratings: Critical, High, Medium, Low, Info
Vulnerability intelligence: CVE mapping, exploit availability
Remediation guidance: Specific steps to fix identified issues
Plugin Families
Web Servers
HTTP/HTTPS server vulnerabilities
Web application testing
Windows
Windows OS and service vulnerabilities
Windows infrastructure
Backdoors
Known backdoor and malware detection
Compromise assessment
Databases
Database-specific vulnerabilities
Database security testing
General
Miscellaneous vulnerability checks
Comprehensive scanning
Denial of Service
DoS vulnerability testing
Availability testing
Default Unix Accounts
Default account detection
Configuration assessment
SCADA
Industrial control system security
Critical infrastructure
Plugin Management
Plugin Rules for False Positive Management
Common False Positive Exclusions
Credentialed Scanning
Overview
Credentialed scanning provides legitimate authenticated access to target systems, enabling Nessus to perform comprehensive security assessments that are impossible with network-only scanning.
Benefits:
Deep system analysis - Local security configurations
Patch level assessment - Missing security updates
Configuration auditing - Security policy compliance
Local privilege escalation - Misconfigured permissions
Malware detection - File system analysis
Authentication Methods
SSH Authentication (Linux/Unix)
SSH Key Generation
Windows Authentication
Kerberos Authentication
Database Credentialed Scanning
Microsoft SQL Server
MySQL/MariaDB
PostgreSQL
Oracle Database
Web Application Authentication
HTTP Basic Authentication
HTTP Form-Based Authentication
HTTP Header Authentication
Verification of Credentialed Access
Successful Authentication Indicators
Authentication Failure Troubleshooting
HTB Academy Lab Configuration
Lab Credentials
Linux Systems
Windows Systems
Pre-configured Scans
Note: HTB Academy provides pre-configured credentialed scans to save time during the lab exercises. These scans demonstrate:
Linux Credentialed Scan - Using htb-student_adm account
Windows Credentialed Scan - Using administrator account
Comparison Analysis - Credentialed vs. non-credentialed results
Advanced Scanning Techniques
Compliance Scanning
PCI DSS Compliance
CIS Benchmarks
Malware Detection
Patch Management Assessment
Scan Results Analysis
Vulnerability Prioritization
Risk-Based Analysis
CVSS Score Integration
False Positive Management
Common False Positives
Verification Methods
Reporting and Documentation
Executive Summary Report
Technical Report
Custom Report Templates
Compliance Reports
Integration with CPTS Methodology
Workflow Integration
Phase 1: Post-Enumeration Assessment
Phase 2: Vulnerability Scanning
Phase 3: Results Correlation
Exploitation Planning
Best Practices
Scanning Ethics and Safety
Performance Optimization
Credential Security
Quality Assurance
Tools Summary
Nessus Professional
Comprehensive vulnerability scanning
Primary vulnerability assessment
Nessus Essentials
Limited free version
Small environment testing
Tenable.io
Cloud-based vulnerability management
Enterprise continuous monitoring
Nessus Agent
Continuous monitoring
Internal asset assessment
Key Takeaways
Credentialed scanning provides significantly more comprehensive results than network-only scans
Custom scan policies enable consistent and targeted vulnerability assessments
Plugin management is essential for reducing false positives and improving accuracy
Authentication verification ensures credentialed scans are functioning properly
Risk-based prioritization focuses remediation efforts on the most critical vulnerabilities
Integration with enumeration phases provides comprehensive security assessment
Proper documentation supports effective vulnerability management programs
References
Tenable Nessus User Guide
HTB Academy: Vulnerability Assessment
NIST SP 800-40: Guide to Enterprise Patch Management
OWASP Vulnerability Scanning Guide
PCI DSS Vulnerability Scanning Procedures
SANS Vulnerability Assessment Methodologies
Last updated