Date : 06 Mar, 2025


[Download Nessus](https://www.tenable.com/ downloads/nessus)

  1. Install and connect via SSL
    attachments/Pasted image 20250406193646.png|800

  2. advance -> proceed anyway -> continue -> register for nessus essentials
    attachments/Pasted image 20250406193802.png|800

  3. Give your details

  4. Note down the activation code
    attachments/Pasted image 20250406193846.png|800

  5. In place of password, give activation code.


IVM Process

![[attachments/IVM Process.pdf]]

Note

Key Concepts:

  • Infrastructure = Servers, databases, firewalls, routers, etc.
  • Vulnerability = Weaknesses that hackers could exploit.
  • Management = Steps to find and fix those weaknesses.

Question

Why is an authenticated scanning required?

  1. Better Results : Nessus gives more accurate results with login credentials.
  2. Deep scanning : It can check inside the system, access important files, and find hidden vulnerabilities.
  3. More vulnerabilities found : Without login, Nessus can only check open ports and services, missing deeper security risks.

Reporting:


Manual Analysis:


Remediation Process:


Regular Scanning:


Follow up:

•    Set Reminders: Ensure follow-ups before the deadline to track remediation progress.

•    Rescanning: Once patches are applied, rescan the servers to verify fixes. Repeat until all issues are resolved.

•    Risk Acceptance:

•  Regular Nessus Scan: The scan is scheduled once a month to ensure continuous security.


False positive analysis

  1. True Positive : means Nessus has flagged a vulnerability & upon manual analysis, we also got a confirmation that actually vulnerability is there.
  2. False Positive:
  1. True Negative: Nessus has not flagged a vulnerability & upon manual analysis, we also got a confirmation that actually vulnerability is not present
  2. False Negative means Nessus has not flagged a vulnerability & upon manual analysis, we got a confirmation that actually vulnerability is present.
Note

For each flagged vulnerability raised by Nessus, there is one Plugin ID

  • Nessus client connects every day to Nessus central repository server to check for any plugin update & if it finds any new Plugin ID, it downloads to client machine
  • Nessus Scanner uses Nessus Attack Scripting Language (NASL)
  • With NASL specific attacks can be automated, based on known vulnerabilities & file extension is .nasl

💡 Through this learning, I understood not just how to use Nessus, but also the importance of approvals, scanning strategy, report analysis, and continuous patch management in keeping an organization safe.