Skip to content

AdiH8/Vulnerability-Management-with-Nessus-Essentials

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Vulnerability management is the process of identifying, evaluating, prioritizing, and mitigating security vulnerabilities in computer systems, networks, and applications. It involves continuously monitoring and assessing the security posture of the organization and taking proactive steps to prevent and remediate potential threats.

Install VMWare Player

The first step in setting up a vulnerability management environment is to install a virtualization software, such as VMWare Player. This software enables the creation and management of virtual machines (VMs) that can be used for testing and assessing security vulnerabilities.

Download Windows 10 ISO

To create a virtual machine, an operating system needs to be installed. Download the Windows 10 ISO file from the Microsoft website.

Download and Install Nessus Essentials

Nessus Essentials is a free vulnerability scanner that can be used to assess the security posture of a system. Download and install the software from the Tenable website.

Setup Virtual Machine

Create a new virtual machine using the VMWare Player software. Choose the Windows 10 ISO as the operating system installation media, and configure the virtual machine settings, such as the amount of RAM, CPU cores, and storage space.

Ensure connectivity with VM

Ensure that the virtual machine is properly configured and can connect to the internet. Test the connectivity by opening a web browser and browsing to a website.

Create a new scan in Nessus

Open Nessus Essentials and create a new scan. Specify the IP address of the virtual machine as the target of the scan.

Inspecting the first scan (no credentials)

Run the first scan without credentials. This will provide an initial assessment of the vulnerabilities present on the virtual machine.

Configuring VM for credentialed scans

To enable Nessus to perform credentialed scans, configure the virtual machine to allow remote access using a username and password. Enable remote desktop access and create a new user account with administrative privileges.

First scan with credentials

Create a new scan in Nessus and configure it to use the credentials of the new user account. Run the scan to assess the security vulnerabilities of the virtual machine with authenticated access.

Inspecting First scan with credentials results

Inspect the results of the scan with credentials. Compare them to the results of the first scan without credentials to identify any additional vulnerabilities that were discovered with authenticated access.

Installing a deprecated Firefox on our VM

To simulate a real-world scenario, install a deprecated version of Firefox on the virtual machine. This will expose the system to known vulnerabilities that can be identified and remediated.

Inspect scan results after installing deprecated Firefox

Run a new scan after installing the deprecated Firefox version. Inspect the scan results to identify any new vulnerabilities that were discovered.

Remediating some vulnerabilities

Identify the vulnerabilities that can be remediated, and take the necessary steps to fix them. For example, update software versions or apply security patches.

Inspect scan results after remediating some vulnerabilities

Run a new scan after remediating the identified vulnerabilities. Inspect the results to ensure that the remediation efforts were successful in mitigating the security vulnerabilities.

About

A vulnerability management project with Nessus

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published