Networking

profileAhokie
PerformingaSecurityAssessment.docx

Amy Hoekwater

19 Jan 2019

Brandon Bass

ITT 307

Performing a Security Assessment

To start, you need to type the above command in. This particular command allows you to scan and discover and device in the 192.168.56.0-192.168.56.255 range.

Here you can see the scan report for every IP address found and the OS scan for them as well as some other things.

Now we’ll move on to Nessus vulnerability scanning. First you need to download the package which can be found on Tenable’s website. I had to install the amd64 version for Kali Linux. You also need to register for a home activation code (which is free) otherwise Nessus will not work.

Open terminal and change the directory to Downloads. Then run the script “dpkg -I (insert file name here) Nessus-7.0.3-debian6_amd64.deb”. It will run some scripts. The next thing you need to type is “/etc/init.d/nessusd start” to start the service.

Open a web browser (Firefox ESR) and type in https://(hostname):8834 where hostname is the name of your computer.

This page will show up:

Create an account that you will use to login every time you use Nessus.

This is where that activation code Tenable emails you comes in handy.

Let it load. When it comes to the main splash screen, look all the way to the right and click on new scan.

Here you select the scan you want to use. I selected Advanced Scan.

Here you name the sweep and afterward type in the objectives. I utilized an IP address run since the majority of my hosts I need checked all fall in a similar IP address extend. After the sweep is finished, it

will demonstrate to you the IP tends to it filtered, just as the vulnerabilities in a little outline to one side of the IP address.

If you click on the IP address, it will expand into a page that lists all of the vulnerabilities.

When you click on the vulnerabilities, it gives you a description of it as well as solutions on how to fix it.

Vulnerability scanning and entrance testing are fairly comparative undertakings with few, yet key, contrasts. Powerlessness examining demonstrates the client known vulnerabilities and explains how they can be controlled if a programmer were to find them. It likewise illuminates the client on the most proficient method to unravel the issue and lessen the danger of assault with that particular weakness. Defenselessness testing is ordinarily led by an in-house group and does not require a high level of expertise since it is fundamentally sweep, pause, and break down. Weakness checking is prescribed to be utilized after any extra hardware is added to the system or if any huge changes are made to the system. Entrance testing is the way toward distinguishing obscure exploits and shortcomings inside a system. Entrance testing demonstrates the client already unidentified vulnerabilities and exploits in the system. The tests are performed on increasingly outside confronting gadgets since that is the place the exploits would be utilized by a programmer. They ought to be led each time something is added to the outward confronting piece of the system or if any critical changes are made to that piece of the system. The tests ought to be finished by an outside counseling organization that ought to be turned for two reasons. The main reason is workers inside the organization can end up disappointed in their position and utilize the exploits found to hurt the organization somehow. The second reason is equivalent to the first, except on an organization premise.