TryHackMe: RP: Nessus
[Task 1] Deploy!
[Task 2] Installation
After installation, open nessus
sudo /etc/init.d/nessusd start
Open browser and type
Select Nessus Essentials and click continue
Input activation code
Create user account
After finish installation, login with credential
[Task 3] Nessus Quiz
- As we log into Nessus, we are greeted with a button to launch a scan, what is the name of this button?
2. Nessus allows us to create custom templates that can be used during the scan selection as additional scan types, what is the name of the menu where we can set these?
3. Nessus also allows us to change plugin properties such as hiding them or changing their severity, what menu allows us to change this?
4. Nessus can also be run through multiple ‘Scanners’ where multiple installations can work together to complete scans or run scans on remote networks, what menu allows us to see all of these installations?
5. Let’s move onto the scan types, what scan allows us to see simply what hosts are ‘alive’?
Click New Scan
6. One of the most useful scan types, which is considered to be ‘suitable for any host’?
7. Following a few basic scans, it’s often useful to run a scan wherein the scanner can authenticate to systems and evaluate their patching level. What scan allows you to do this?
8. When performing Web App tests it’s often useful to run which scan? This can be incredibly useful when also using nitko, zap, and burp to gain a full picture of an application.
[Task 4] Scanning!
- Deploy the machine and connect to the network
- Create a new ‘Basic Network Scan’ targeting the deployed VM. What option can we set under ‘BASIC’ to set a time for this scan to run? This can be very useful when network congestion is an issue.
Click Basic Network Scan, and type the name and target
Click Schedule and Enabled
3. Under discovery set the scan to cover ports 1–65535. What is this type called?
Click Discovery and select scan type
4. As we are connected to the network via a VPN, it may be to our benefit to ‘tone down’ the scan a bit. What scan type can we change to under ‘ADVANCED’ for this lower bandwidth connection?
Click ADVANCED, select scan type
5. With these options set (other than the time to run) save and launch the scan.
Launch the scan
Wait the for scan to finish
6. After the scan completes, which ‘Vulnerability’ can we view the details of to see the open ports on this host?
7. There seems to be a chat server running on this machine, what port is it on?
8. Looks like we have a medium level vulnerability relating to SSH, what is this vulnerability named?
9. What web server type and version is reported by Nessus?
[Task 5] Wait, there’s mail?
- An optional but awesome additional step, link your Nessus box up to an SMTP server via the Settings panel. Google provides this for free if you already have a Gmail account. Adding 2-factor authentication on your account and create an app password, then link Nessus to the Gmail SMTP server via these following settings: https://www.siteground.com/kb/google_free_smtp_server/
[Task 6] So you’re telling me that’s how you set up a web app…
- Run a web application scan against this new box.
Click new scan
Click Web Application Tests, set up scan settings, and start
2. What is the plugin id of the plugin that determines the HTTP server type and version?
3. What authentication page is discovered by the scanner that transmits credentials in cleartext?
4. What is the file extension of the config backup?
Follow the path
5. Which directory contains example documents? (This will be in a php directory)
Follow the path
6. What vulnerability is this application susceptible to that is associated with X-Frame-Options?
7. What version of php is the server using?