Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003.

Slides:



Advertisements
Similar presentations
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
Monitoring Your Network Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop discussion.
System Security Scanning and Discovery Chapter 14.
9-Performing Vulnerability Assessments Dr. John P. Abraham Professor UTPA.
Vulnerability Assessments with Nessus 3 Columbia Area LUG January
Vulnerability Analysis Borrowed from the CLICS group.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
2004, Jei Nessus A Vulnerability Assessment tool A Security Scanner Information Networking Security and Assurance Lab National Chung Cheng University
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Computer Security and Penetration Testing
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
1 GFI LANguard Network Security Scanner. 2 Contents Introduction Features Source & Installation Testing environment Results Conclusion.
Vulnerability Types And How to Use Them.
Port Scanning.
Linux Operations and Administration
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
Distributed Network Security Using Free Tools in University Environments Jeff Bollinger, CISSP, GSEC Doug Brown, CISSP, GSEC University of North Carolina.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
1 GFI LANguard N.S.S VS NeWT Security Scanner Presented by:Li,Guorui.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
1 Nessus - NASL Marmagna Desai [592- Project]. 2 Agenda Introduction –Nessus –Nessus Attack Scripting Language [ N A S L] Features –Nessus –NASL Testing.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
MIS Week 6 Site:
CIS 450 – Network Security Chapter 3 – Information Gathering.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Lab 1: Reconnaissance, Network Mapping, and Vulnerability Assessment Reconnaissance Scanning Network Mapping Port Scanning OS detection Vulnerability.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
MIS Week 6 Site:
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Introduction A security scanner is a software which will audit remotely a given network and determine whether bad guys may break into it,or misuse it.
I3Live Security Paul Wisniewski UW-Madison August, 2010.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
Retina Network Security Scanner
SecurityCenter & Palo Alto Configuration Guide. About this Guide This guide provides an overview of how to get the most from Palo Alto firewalls when.
VULN SCANNING Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Hands-On Ethical Hacking and Network Defense
Linux Operations and Administration
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
IT 463 – Scanning Assignment Shane Knisley Erik Bennett.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Penetration Testing Scanning
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
Port Knocking Benjamin DiYanni.
CITA 352 Chapter 5 Port Scanning.
100% REAL EXAM QUESTIONS ANSWERS
Grades4sure PDF Dumps CompTIA Security + Certification Exam
Vulnerability Scanning with Credentials
Intro to Ethical Hacking
Intro to Ethical Hacking
Lecture 3: Secure Network Architecture
Presentation transcript:

Nessus – A Vulnerability Scanning Tool SUNY Technology Conference June 2003

Bill Kramp Finger Lakes Community College Canandaigua, NY

Outline What is Nessus? Why use it? System and Software ConfigurationScanningReportsDemonstrationDiscussion

Nessus Vulnerability scanning tool Open source Zero software costs Zero annual maintenance costs Minimal hardware needs

Why scan? To meet your campus security policy. To find out what services are running. To double check that software patches are installed correctly. If you don’t find the holes, the hackers will. Like Martha says “It’s a good thing”.

System Requirements Server: Linux Linux Solaris Solaris FreeBSD FreeBSDClients: Win32 Win32 X11 X11 Java Java

Server Software Four basic parts to the Nessus server: Nessus-core Nessus-core Nessus-libraries Nessus-libraries Libnasl Libnasl Nessus-plugins Nessus-plugins

Plugins Plugins are the scripts that perform the vulnerability tests. NASL – This is the Nessus Attack Scripting Language which can be used to write your own plugins. Nessus-update-plugins command– A script that will download new, or updated Nessus plugins. Can be run manually or from cron plugins available as of June 10, 2003

Port Scanners Port scanning will detect the ports (services) available. Port scanning types: Ping Ping SYN scan SYN scan Tcp connect() scan Tcp connect() scan Scan for LaBrea tarpitted hosts Scan for LaBrea tarpitted hosts SNMP port scan SNMP port scan Can define port ranges to scan

Defining Targets Hosts Server.domain.edu Server.domain.edu Subnet Address range

Vulnerability Scanning Scanning methods: Safe Safe Destructive Destructive Service recognition – Will determine what service is actually running on a particular port. Handle multiple services – Will test a service if it appears on more then one port. Will test multiple systems at the same time.

Viewing Reports Nessus will indicate the threat level for services or vulnerabilities it detects: Low severity – Notification of issues Low severity – Notification of issues Medium severity – Warnings to think about Medium severity – Warnings to think about High severity – Issues that should be resolved High severity – Issues that should be resolved Description of vulnerability Risk factor CVE number

Common Vulnerabilities and Exposures CVE created by Attempting to standardize the names for vulnerabilities. Attempting to standardize the names for vulnerabilities. CVE search engine at

Report Options Output types: Text Text HTML HTML PDF PDF Filter by severity Sort by host or vulnerability

Export Options Comma Separated MySQLSQL Nessus.nsl

User Accounts Nessus supports individual accounts. Different rules can be applied to each account: Limit access to specific host(s) Limit access to specific host(s) Limit access by subnets Limit access by subnets Have no restrictions Have no restrictions

Connecting to Nessus Server

Define the Targets

Selecting Plugins

Scanning…

Testing Completed

Viewing Session Results

Nessus Resources Nessus PHP Interface (to MySQL): essus-php/ essus-php/ essus-php/ Win32 Client: Gnome Client:

Commercial Products SecureScan Retina Internet Scanner

Discussion Does any campus have policies to test? What software are other campuses using?

Nessus – A Vulnerability Scanning Tool A complete copy of the Power Point presentation will be available on the college website at