Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
184
For this example, we’ll use the
Detailed Vulnerabilities By Host
template, which presents detailed
findings grouped by each host. We’ll
then select
PDF
as format and click
Generate Report
.
Figure 61: Select the Report Format and Template
After this, we can download or open the PDF report.
We could also use the
Complete List of Vulnerabilities by Host
template to create a summary of
the vulnerabilities instead of including detailed information.
For more information on how to customize the reports, consult the scan exports
and reports section on the Tenable Documentation page.
320
In the last two sections we performed a vulnerability scan, reviewed the results, and generated a
PDF report with detailed information for all hosts. We can get more
familiar with Nessus by
customizing the scan configurations and analyzing how the scanning behavior and results differ.
7.2.5
Performing an Authenticated Vulnerability Scan
In this section we will perform an authenticated vulnerability scan
by providing credentials to
Nessus. As we discussed previously, authenticated scans produce more detailed information and
reduce the number of false positives.
To demonstrate this, we will use an authenticated
vulnerability scan against the target
DESKTOP
.
We need to consider that an authenticated scan not only creates a lot of traffic
on the network, but also a huge amount of noise on the system itself, such as log
entries and AV notifications.
320
(Tenable Docs, 2022), https://docs.tenable.com/nessus/Content/ScanReportFormats.htm
Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
185
To begin, we’ll click
New Scan
on the Nessus dashboard.
Figure 62: Creating a new Scan
Even though all Nessus templates accept user credentials, we’ll use the
Yüklə
Dostları ilə paylaş: