Here is a structured, revision‑friendly set of notes for your course.
URL: https://localhost:8834/ 1. Nessus Overview Nessus is a widely used vulnerability scanner for cybersecurity professionals, network engineers, and system administrators. It scans network devices and compares them against a large database of known vulnerabilities so you can remediate issues before attackers exploit them. Course goals: install and configure Nessus, run scans, and interpret results to improve security. What You Need to Know Designed for users new to Nessus; no prior vulnerability scanning experience required. Helpful background: basic system administration, IP addresses, ports, and port scanning (e.g., Nmap). Nessus scans build on the idea of port scanning to discover services and vulnerabilities. Nessus Editions Nessus began as open source in 1998; moved to closed source and commercial licensing in 2005. Editions: Nessus Essentials: free, used in this course, limited to 16 IPs. Nessus Professional / Expert: paid, per‑scanner licensing, for larger environments. Tenable ecosystem: Tenable Security Center / Security Center Plus (central dashboards), Tenable Vulnerability Management (cloud‑based). 2. Installing and Accessing Nessus Installing Nessus on Linux (Ubuntu example) Supported: Ubuntu, RHEL, FreeBSD, SUSE, Fedora, Debian, Raspberry Pi, Amazon Linux, etc. Steps (Ubuntu): Download Nessus installer from Tenable website (requires name, email, license acceptance). Copy installer to server. Install with sudo dpkg -i <package-name> (exact name may vary by version/architecture). Start service: sudo systemctl start nessusd.service. After installation, configuration continues via web console (same for Linux and Windows). Installing Nessus on Windows Download Windows installer from Tenable download page, accept license, run standard wizard. Use default installation path unless you have specific needs. After setup completes, installer opens the web console to confirm it’s running. Configure the Windows firewall: Create inbound rule for TCP port 8834 to allow access to the Nessus web interface. In production, restrict source IPs to authorized admin systems only. Accessing the Nessus Console Use a browser: https://<server-ip>:8834. Self‑signed TLS certificate will trigger a warning; in production, use a trusted CA or internal PKI certificate. Initial setup workflow: Choose edition (e.g., Nessus Essentials). Provide name and email to obtain activation code (or paste existing activation code). Create Nessus user account (username and password). Nessus downloads plugins and completes setup (10–20 minutes). 3. Vulnerability Management Fundamentals What Is Vulnerability Management? Modern systems have millions of lines of code; complexity guarantees bugs and vulnerabilities. Vendors respond by issuing patches; admins must apply patches across OSs, apps, devices, and libraries. A mature vulnerability management program includes: Regular scanning for vulnerabilities. Patch application. Tracking remediation status. Reporting results. Common Drivers for Vulnerability Programs Improve security (primary purpose). Corporate policy mandates (may dictate tools, deadlines, reporting formats). External regulation: PCI DSS (for credit card data): Quarterly internal and external scans. New scans after significant changes. Use Approved Scanning Vendor (ASV) for external scans. Remediate and rescan until no significant vulnerabilities remain. FISMA (US gov): Follow NIST SP 800‑53 controls. Regularly scan systems/apps, analyze results, remediate, and share vulnerability info across agencies. Types of Vulnerability Tests Network vulnerability scans: probe devices and services across the network. Application scans: test the code of applications for flaws. Web application scans: focus on web‑specific issues like SQL injection and XSS. Complement scans with configuration reviews and log analysis to detect false positives and context. 4. Building a Vulnerability Management Program Identifying Scan Targets (Asset Inventory) Start from program requirements (security goals, compliance, corporate policy). Use a trusted asset inventory: Configuration management tools with up‑to‑date system lists. If missing, use a light network discovery scan (not a full vulnerability scan) to find hosts. Example with Nessus host discovery: Create “Host Discovery” scan. Enter targets (hostnames, IPs, ranges). Run scan and review discovered hosts and open ports. Use results as input to detailed vulnerability scans. Prioritizing Assets For each asset, evaluate:
...