Vulnerability Priority Rating.
The next page we’ll examine is
Remediations
. If Nessus detects a vulnerability, the plugins often
contain a remediation strategy, or information on how to mitigate the vulnerability. In the case of
the Apache vulnerabilities from Figure 55, we get the following information.
Figure 59: Remediation of Vulnerabilities
The last report page is
History
. This page lists all vulnerability scans with this configuration. We
can use it to review or compare results of previous scans.
We now have an understanding of how to view the results of a Nessus scan. Next, let’s create a
PDF report of our vulnerability scan. We can do this by using the functions in the
Report
dashboard. Apart from the creation of a report, the functions also cover the change of the scan
configuration, launch of another scan, or exporting data. We can also configure an
Audit Trail
,
319
which allows us to analyze why a specific plugin behaved in a certain way. It can be used to
reduce the number of false negatives.
Let’s create a PDF report for our first vulnerability scan by clicking
Report
.
Figure 60: Create a Report
Once we click on the button, a new window allows us to use different report templates. Each
template generates the report with a different structure, focus, and content.
319
(Tenable Community, 2020), https://community.tenable.com/s/article/Analyzing-the-Audit-Trail
Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
184
For this example, we’ll use the
Detailed Vulnerabilities By Host
template, which presents detailed
findings grouped by each host. We’ll then select
PDF
as format and click
Generate Report
.
Figure 61: Select the Report Format and Template
After this, we can download or open the PDF report.
We could also use the
Complete List of Vulnerabilities by Host
template to create a summary of
the vulnerabilities instead of including detailed information.
For more information on how to customize the reports, consult the scan exports
and reports section on the Tenable Documentation page.
320
In the last two sections we performed a vulnerability scan, reviewed the results, and generated a
PDF report with detailed information for all hosts. We can get more familiar with Nessus by
customizing the scan configurations and analyzing how the scanning behavior and results differ.
7.2.5
Performing an Authenticated Vulnerability Scan
In this section we will perform an authenticated vulnerability scan by providing credentials to
Nessus. As we discussed previously, authenticated scans produce more detailed information and
reduce the number of false positives. To demonstrate this, we will use an authenticated
vulnerability scan against the target
DESKTOP
.
We need to consider that an authenticated scan not only creates a lot of traffic
on the network, but also a huge amount of noise on the system itself, such as log
entries and AV notifications.
320
(Tenable Docs, 2022), https://docs.tenable.com/nessus/Content/ScanReportFormats.htm
Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
185
To begin, we’ll click
New Scan
on the Nessus dashboard.
Figure 62: Creating a new Scan
Even though all Nessus templates accept user credentials, we’ll use the
Yüklə Dostları ilə paylaş: |