Nessus.

Slides:



Advertisements
Similar presentations
Navigating the New SAQs (Helping the 99% validate PCI compliance)
Advertisements

Lucas Schill Brent Grover Ed Schilla Advisor: Danny Miller.
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Which server is right for you? Get in Contact with us
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Privileged Identity Management Enterprise Password Vault
Random Password Manager Centralized scalable password management security and recovery Joe Vachon Sales Engineer.
NETOP REMOTE CONTROL What’s new in version 9.5? DECEMBER 09 NETOP REMOTE CONTROL1.
Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges This work is the intellectual property of the author. Permission.
System Security Scanning and Discovery Chapter 14.
Vulnerability Assessments with Nessus 3 Columbia Area LUG January
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
XenMobile 10 MDM and MAM Unified Architecture Adolfo Montoya
OPC Systems.NET. Open Automation Software Based in Lakewood, Colorado USA Founded in 1994 OPC Systems.NET released in 2004 Over 100k+ server licenses.
OPC WPFHMI.NET.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
Computer Security and Penetration Testing
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Enterprise Network Security Accessing the WAN Lecture week 4.
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Rob Williams Program Manager Microsoft Corporation.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
MIT Libraries’ FileMaker Use Policy as an example local DLC policy.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
UTC F&S EMEA Oct’13 - Intrusion Advisor Advanced Market Call 4 November 2013.
Training on ManageEngine Desktop Central
AIT 616 Fall 2002 PHP. AIT 616 Fall 2002 PHP  Special scripting language used to dynamically generate web documents  Open source – Free!!!  Performs.
OPC Database.NET. OPC Systems.NET What is OPC Systems.NET? OPC Systems.NET is a suite of.NET and HTML5 products for SCADA, HMI, Data Historian, and live.
Remote Service Solutions ATS 8550
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Open Web App. Purpose To explain Open Web Apps To explain Open Web Apps To demonstrate some opportunities for a small business with this technology To.
A Comparison of Linux vs. Windows Bhargav A. Sorathiya B.E. 4 th C.E. Roll no:6456.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
1 © Copyright 2009 EMC Corporation. All rights reserved. ISIS and PixTools Toolkits Quickly Enabling Document Capture Solutions EMC Corporation.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
The Microsoft Baseline Security Analyzer A practical look….
Lucas Schill Brent Grover Ed Schilla Advisor: Danny Miller.
NETWORKING IN LINUX. WHAT IS LINUX..? Freely implemention of UNIX-like Kernel. Free & Open source Software. Developed by Linus Torvalds in 1991.
Network Assessment How intrusion techniques contribute to system/network security Network and system monitoring System mapping Ports, OS, applications.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Server Performance, Scaling, Reliability and Configuration Norman White.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
TCOM Information Assurance Management System Hacking.
User Manager Pro Suite continued… All-in-One Security, Management & Reporting.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Web Services using PHP. web services (recap) Web services today are frequently just Application Programming Interfaces (API) or web APIs that can be accessed.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
CloudBerry Explorer for S3. CB Explorer Free to use Browse and manage files PowerShell functions Open and edit files  CloudBerry Explorer is an easy.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
SQL Database Management
Web Application Security
Overview – SOE PatchTT November 2015.
Overview – SOE PatchTT December 2013.
Windows Mobile 2003 For The Enterprise
Features Overview.
IT Management, Simplified
Presentation transcript:

Nessus

Who, What, Why piis8@yahoo.com Tenable Nessus 4.2.x Seccubus Inprotect isac “piss” Tenable Nessus 4.2.x Seccubus Inprotect Improving the use of the tools Lots of new features and changes **Some statements contained herein are my own poorly validated conclusions and may be utter rubbish. http://gophermash.blogspot.com/

Objective Nessus Seccubus Inprotect Data Quick overview Version 4.x , What is new Seccubus Why Bulk scanning Inprotect Data The bane of my existance Nessus http://www.nessus.org/nessus/ License Agreement http://cgi.tenablesecurity.com/Nessus_4_SLA_and_Subscription_Agreement.pdf Seccubus http://seccubus.com/ Inprotect http://inprotect.sourceforge.net/ Data http://lmgtfy.com/?q=parse+nessus+output

Nessus The Nessus® vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks. -- Tenable In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. --wilipedia Nessus http://www.nessus.org/nessus/ License Agreement http://cgi.tenablesecurity.com/Nessus_4_SLA_and_Subscription_Agreement.pdf

Nessus Apr 04 1998 first alpha version released on bugtraq May 17 2000 1.0.0 released Feb 24 2003 2.0.0 released Dec 07 2004 2.2.1 released Foreshadowing of a future Jan 1 2005 Feed Model Changes Dec 12 2005 3.0.0 released Closed Source, proprietary license Oct 30 2006 2.2.9 released Last open source build Announcements Website http://www.nessus.org/news/ Discussions Announcements Site https://discussions.nessus.org/community/announcements

Nessus Mar 12 2008 3.2 released Jul 31 2008 Feed Model Changes Registered / Direct  Home/Professional Feb 16 2009 Mail Lists Disabled Web based ‘Discussion Forums’ / nessus-announce stays Apr 09 2009 4.0.0 released Nov 30 2010 4.2.0 released Web based interface Apr 15 2010 4.2.2 released http://marc.info/?l=nessus-announce&m=123178018626097&w=2

Shiny Web Interface, no more stand-alone client Flash / XMLRPC communications Keep a copy of the 4.0.2 client Web Interface is still unique to each scan engine NTP 1241 disabled for Home Feed Other limitations on Home Feed, ie. 15 max hosts NTP 1241 enabled for Professional Feed …but for how long? Shared Policies New xml output format, .nessus v2 Still no easy way to share reports

Flash Why, Why, Why, Why Renaud states <insert paranoia here> Renaud states “In the (not-so-distant) future, yes, HTML5 will probably be the way to go and our backend is ready for that.” … “However, today, we use Flash because it's the most efficient technology to take us where we need to be.” Adobe Flash Decompilers Why Flash https://discussions.nessus.org/message/5128;jsessionid=E5939693AD30F482214D55378ED72027 Decompile http://code.google.com/p/flash-decompiler/ General Adobe bashing http://www.zdnet.com/blog/bott/how-secure-is-flash-heres-what-adobe-wont-tell-you/2152 Symantec Threat Report http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf Adobe Security http://www.adobe.com/security/ http://www.adobe.com/devnet/flashplayer/articles/flash_player_10_security.pdf http://www.adobe.com/devnet/flashplayer/articles/flash_player_9_security.pdf http://www.adobe.com/devnet/flashplayer/articles/flash_player_8_security.pdf http://www.adobe.com/devnet/flashplayer/articles/flash_player_7_security.pdf

XMLRPC ??? Future scripting / integration with 3rd party tools? It's remote procedure calling using HTTP as the transport and XML as the encoding. XML-RPC is designed to be as simple as possible, while allowing complex data structures to be transmitted, processed and returned. -- xmlrpc.com Future scripting / integration with 3rd party tools? libs available for perl / ruby / C / .net / php / etc. 3rd party catch-up Kost on Freshmeat Net::Nessus::XMLRPC (perl) nessus-xmlrpc (ruby) Port 1241 ? http://blog.upbeat.fr/post/407107943/automating-scans-on-nessus-4-2 https://discussions.nessus.org/message/5995;jsessionid=23B68091A3049FACAB6B85A85598B32A http://www.tumblr.com/tagged/Nessus+4.2 http://freshmeat.net/projects/nessus-xmlrpc http://freshmeat.net/projects/netnessusxmlrpc

Home vs. Professional Home Free Max 15 hosts (simultaneous) No Credential Scanning No Compliance checks No SCADA checks No NTP / port 1241 Professional $1200 / year Unlimited hosts Credential Scanning Compliance Checks SCADA checks NTP /port 1241 support Kost on Freshmeat

Compliance (ProFeed only) As of May 4th , 68 audit files. Windows best practices *nix (linux, bsd, solaris, hpux) best pratices Antivirus Confidential data PCI / Banking data SSN Copyright / P2P Govt Keywords And more Bypass Home https://discussions.nessus.org/message/4152#4152 4.0.2 on new linux cp libssl.so.0.9.8n /usr/lib/. ln –s /libssl.so.0.9.8n /usr/lib/libssl.so.8 cp libcrypto.so.0.9.8n /usr/lib/. ln –s /libcrypto.so.0.9.8n /usr/lib/libcrypto.so.8

Hacks Bypass Home restrictions (unconfirmed) Did not get this to work. Seems like it works as long as you are offline. Shared Reports (scriptable) Drop reports to local user space 4.0.2 on new linux Tenable only gives you an .rpm ( Fedora - libssl / libcrypto dependency) Copy old .0.9.8n and symlink it to .8 Bypass Home Feed Does not appear to work, definitely don’t let the server talk to nessus.org https://discussions.nessus.org/message/4152#4152 4.0.2 on new linux cp libssl.so.0.9.8n /usr/lib/. ln –s /libssl.so.0.9.8n /usr/lib/libssl.so.8 cp libcrypto.so.0.9.8n /usr/lib/. ln –s /libcrypto.so.0.9.8n /usr/lib/libcrypto.so.8

Hacks Report Sharing Files have “cryptic” names Files stored in /opt/nessus/var/nessus/users/<username>/reports 5ef4e929-8263-99ac-8ef1-78e85fe6d0165b65e004c8e3ead4 5ef4e929-8263-99ac-8ef1-78e85fe6d0165b65e004c8e3ead4.name 5ef4e929-8263-99ac-8ef1-78e85fe6d0165b65e004c8e3ead4.nessus 5ef4e929-8263-99ac-8ef1-78e85fe6d0165b65e004c8e3ead4.nessus.v1 Script a cp job to move files to alternate user space Bypass Home https://discussions.nessus.org/message/4152#4152 4.0.2 on new linux cp libssl.so.0.9.8n /usr/lib/. ln –s /libssl.so.0.9.8n /usr/lib/libssl.so.8 cp libcrypto.so.0.9.8n /usr/lib/. ln –s /libcrypto.so.0.9.8n /usr/lib/libcrypto.so.8

Lightweight web based front end, perl and php with a flat file db http://seccubus.com/ written by Frank Breedijk, Security Engineer at Schuberg Philis Lightweight web based front end, perl and php with a flat file db User authentication is dependent on the web server Good for a small team does not scale well to a large user base http://seccubus.com/

scanmonitor.pl Not a fan of cron Not a fan of “empty” scans Needed a more flexible scheduler scanmonitor.pl allows for a continuous scan loop of the entire enterprise with minimal empty cycles between scan jobs initial scans 60K IPs in 16 hours on 4 scan engines **Can quickly eat hard drive space and memory http://gophermash.blogspot.com/

mrtg / resources

mrtg / resources

Inprotect http://inprotect.sourceforge.net/ written by Greg Kuhnert and team Web based front end, perl and php with a sql db Nice system, should scale nicely to a large user base Installation is improving but still a bit rough http://inprotect.sourceforge.net

DATA DATA DATA

What’s next Automated parsing of critical findings Trend exposure time Compare known postures

Demo

‘The Making of Horror’ Joshua Hoffine