πVulnerability Assessment
Overview
Nessus Professional
Why Nessus?
Installation and Setup
Scan Policies
Overview
Creating Custom Scan Policies
Step 1: Policy Creation
Step 2: Basic Settings
Step 3: Advanced Settings
Specialized Scan Policies
Stealth Scan Policy
Web Application Focused Policy
Internal Network Policy
Nessus Plugins
Plugin Architecture
Plugin Families
Family
Description
Use Case
Plugin Management
Plugin Rules for False Positive Management
Common False Positive Exclusions
Credentialed Scanning
Overview
Authentication Methods
SSH Authentication (Linux/Unix)
SSH Key Generation
Windows Authentication
Kerberos Authentication
Database Credentialed Scanning
Microsoft SQL Server
MySQL/MariaDB
PostgreSQL
Oracle Database
Web Application Authentication
HTTP Basic Authentication
HTTP Form-Based Authentication
HTTP Header Authentication
Verification of Credentialed Access
Successful Authentication Indicators
Authentication Failure Troubleshooting
HTB Academy Lab Configuration
Lab Credentials
Linux Systems
Windows Systems
Pre-configured Scans
Advanced Scanning Techniques
Compliance Scanning
PCI DSS Compliance
CIS Benchmarks
Malware Detection
Patch Management Assessment
Scan Results Analysis
Vulnerability Prioritization
Risk-Based Analysis
CVSS Score Integration
False Positive Management
Common False Positives
Verification Methods
Reporting and Documentation
Executive Summary Report
Technical Report
Custom Report Templates
Compliance Reports
Integration with CPTS Methodology
Workflow Integration
Phase 1: Post-Enumeration Assessment
Phase 2: Vulnerability Scanning
Phase 3: Results Correlation
Exploitation Planning
Best Practices
Scanning Ethics and Safety
Performance Optimization
Credential Security
Quality Assurance
Tools Summary
Tool
Purpose
Use Case
Key Takeaways
References
Last updated