TryHackMe: Nessus Room Writeup

Learn how to set up and use Nessus, a popular vulnerability scanner.

Task 3

What is the name of the button which is used to launch a scan?

New Scan

What side menu option allows us to create custom templates?

Policies

What menu allows us to change plugin properties such as hiding them or changing their severity?

Plugin Rules

In the ‘Scan Templates’ section after clicking on ‘New Scan’, what scan allows us to see simply what hosts are alive?

Host Discovery

One of the most useful scan types, which is considered to be ‘suitable for any host’?

Basic Network Scan

What scan allows you to ‘Authenticate to hosts and enumerate missing updates’?

Credentialed Patch Audit

What scan is specifically used for scanning Web Applications?

Web Application Tests

Task 4

Create a new ‘Basic Network Scan’ targeting the deployed VM. What option can we set under ‘BASIC’ (on the left) to set a time for this scan to run? This can be very useful when network congestion is an issue.

Schedule

Under ‘DISCOVERY’ (on the left) set the ‘Scan Type’ to cover ports 1-65535. What is this type called?

Port scan (all ports)

What ‘Scan Type’ can we change to under ‘ADVANCED’ for lower bandwidth connection?

Scan low bandwidth links

After the scan completes, which ‘Vulnerability’ in the ‘Port scanners’ family can we view the details of to see the open ports on this host?

Nessus SYN scanner

What Apache HTTP Server Version is reported by Nessus?

There might be some confusion here that I must mention. In the below picture we see the apache version is 2.4.25, but that is not the correct answer. You need to wait until the scan finishes or the vulerability named ‘Apache HTTP Server Version’ showes up in the panel. And here below is the true answer:

2.4.99

Task 5

What is the plugin id of the plugin that determines the HTTP server type and version?

10107

What authentication page is discovered by the scanner that transmits credentials in cleartext?

login.php

What is the file extension of the config backup?

To find the config backup you can look up the vulnerabilities including information about some URL paths, and then visit those paths to check if there’re any backup files available.

But here there’s also a medium severity vulnerability showing up, so you can just open it and see the result:

.bak

Which directory contains example documents? (This will be in a php directory)

/external/phpids/0.6/docs/examples/

What vulnerability is this application susceptible to that is associated with X-Frame-Options?

Clickjacking

原创文章转载请注明出处: Nessus Room Writeup