Nessus
Download -> https://www.tenable.com/downloads/nessus?loginAttempted=true
Request free license -> https://www.tenable.com/products/nessus/activation-code
sudo dpkg -i Nessus-10.8.3-ubuntu1804_aarch64.deb
sudo systemctl start nessusd.service
https://localhost:8834
Best practices before a scan
Scans can cause issues on sensitive networks and provide false positives, no results, or have an unfavorable impact on the network. It is always best to communicate with your client (or internal stakeholders if running a scan against your own network) on whether any sensitive/legacy hosts should be excluded from the scan or if any high priority/high availability hosts should be scanned separately, outside of regular business hours, or with different scan configurations to avoid potential issues.
Firewall
Some firewalls will cause us to receive scan results showing either all ports open or no ports open. If this happens, a quick fix is often to configure an Advanced Scan and disable the Ping the remote host
option. This will stop the scan from using ICMP to verify that the host is "live" and instead proceed with the scan. Some firewalls may return an "ICMP Unreachable" message that Nessus will interpret as a live host and provide many false-positive informational findings.
Rate-limiting
In sensitive networks, we can use rate-limiting to minimize impact. For example, we can adjust Performance Options
and modify Max Concurrent Checks Per Host
if the target host is often under heavy load, such as a widely used web application. This will limit the number of plugins used concurrently against the host.
Exlude legacy systems
We can avoid scanning legacy systems and choose the option not to scan printers, as we showed in an earlier section. If a host is of particular concern, it should be left out of the target scope or we can use the nessusd.rules
file to configure Nessus scans. More information about it you can find here.
Disable DoS
Finally, unless specifically requested, we should never perform Denial of Service checks. We can ensure that these types of plugins are not used by always enabling the "safe checks" option when performing scans to avoid any network plugins that can have a negative impact on a target, such as crashing a network daemon. Enabling the "safe checks" option does not guarantee that a Nessus vulnerability scan will have zero adverse impact but will significantly minimize potential impact and decrease scanning time.
Network Impact
sudo apt install vnstat
Let's monitor the eth0 network adapter before running a Nessus scan:
Scanning Issues
> sudo vnstat -l -i eth0
Monitoring eth0... (press CTRL-C to stop)
rx: 332 bit/s 0 p/s tx: 332 bit/s 0 p/s
rx: 0 bit/s 0 p/s tx: 0 bit/s 0 p/s
rx: 0 bit/s 0 p/s tx: 0 bit/s 0 p/s^C
eth0 / traffic statistics
rx | tx
--------------------------------------+------------------
bytes 572 B | 392 B
--------------------------------------+------------------
max 480 bit/s | 332 bit/s
average 114 bit/s | 78 bit/s
min 0 bit/s | 0 bit/s
--------------------------------------+------------------
packets 8 | 5
--------------------------------------+------------------
max 1 p/s | 0 p/s
average 0 p/s | 0 p/s
min 0 p/s | 0 p/s
--------------------------------------+------------------
time 40 seconds