「Nessus」- 部署及使用

  CREATED BY JENKINSBOT

问题描述

该笔记将记录:在 Linux 中,部署及使用 Nessus 的方法,以及常见问题的解决方法。

部署服务

参考 Download Nessus Vulnerability Assessment 页面,我们是免费用户,因此使用 nessus essentials 版本。

我们使用 Docker 部署应用服务,因此该部分将记录如何使用 Docker Compose 运行 nessus 服务。

version: '3'

services:
  backend:
    image: "tenableofficial/nessus"
    container_name: "devops-nessus"
    ports:
      - 58834:8834
    restart: always
    volumes:
      - /etc/localtime:/etc/localtime
    environment:
      # 在官方站点中获取
      - ACTIVATION_CODE=<code>
      - USERNAME=<username>
      - PASSWORD=<password>

注意事项
1)在官方 Docker 部署中,未提及任何管理持久化存储的方式,即删除容器之后数据会丢失
2)根据官方文档的描述,数据的备份与迁移不会保留扫描结果;

使用说明

针对免费版本,默认具有以下功能:

Host Discovery

存活主机发现 和 开放端口发现。

Basic Network Scan

A full system scan suitable for any host.

Advanced Scan

Configure a scan without using any recommendations.

Advanced Dynamic Scan

Configure a dynamic plugin scan without recommendations.

Malware Scan

Scan for malware on Windows and Unix systems.

Web Application Tests

Scan for published and unknown web vulnerabilities.

Credentialed Patch Audit

Authenticate to hosts and enumerate missing updates.

Intel AMT Security Bypass

Remote and local checks for CVE-2017-5689.

Spectre and Meltdown

Remote and local checks for CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754

WannaCry Ransomware

Remote and local checks for MS17-010.

Ripple20 Remote Scan

A remote scan to fingerprint hosts potentially running the Treck stack in the network.

Zerologon Remote Scan

A remote scan to detect Microsoft Netlogon Elevation of Privilege (Zerologon).

Solorigate

Remote and local checks to detect SolarWinds Solorigate vulnerabilities.

2020 Threat Landscape Retrospective (TLR)

A scan to detect vulnerabilities featured in our End of Year report.

ProxyLogon : MS Exchange

Remote and local checks to detect Exchange vulnerabilities targeted by HAFNIUM.

参考文献

Download Nessus Vulnerability Assessment | Tenable®
渗透测试技术—-工具使用(二)–Nessus工具下载及使用(安装在Kali上)
Deploy Nessus as a Docker Image (Nessus)