About Me

My photo
JHC Technology is a Service Disabled, Veteran-Owned, Small Business based in the Washington, DC Metro area. Our primary focus is to offer customized solutions and IT consulting to our Commercial and Government clients. Our experts have a broad experience delivering and managing Microsoft Enterprise applications and Cloud and Virtualization Solutions, as well as mobilizing Enterprise data.

Monday, July 29, 2013

Setting & Configuring Nessus to Secure Your Home Network

If you believe that patching your home network keeps you safe from malicious attacks you are partially correct. Let me explain why.  Do you know what you have installed on your computer, mobile devices or your network devices?

Sometimes software opens up things on your computer that you didn’t even know about.  For instance, if you installed a type of software that allows you to stream media inside and outside your network you basically have a port or several ports open on that system.

Do you know how many ports your computer has the ability to use?  That’s homework for you.
If your system(s) is connect to a network it needs specific ports to work correctly. If your system is on the Internet, you definitely need a few ports. This means that those ports are subject for an attack.

So how secure are these ports, and if they are not, how can you tell? You are in luck. Here is one way that you can get to the bottom of this issue.

First you need to download Nessus Vulnerability Scanner Home Edition (http://www.tenable.com/products/nessus). If you wish to get extra features with support you can purchase the Pro Feed Edition. You will need to activate your Nessus scanner so make sure you follow the procedure to activate it prior to following the steps below. 

So now it is installed. Lets get started.

  1. Open up a browser and navigate to https:/localhost:8834 
  1. When you installed you should have been prompted to set login and password. Once logged in you should see the menus and buttons for: Results, Scan Queue, Scan Templates, Policies, Users, and Configuration
  1. Now, you need to start creating Scan Templates, but before you do that, you first need to define your policies. Generally, I like to set up policies based on my target systems

    A policy in Nessus is basically a set of prewritten code that is programmed to check for specific vulnerabilities.  There are numerous individual plugins that already come with the program. However, you are welcome to write your own checks as well. There are guides to help you out with that.  So if I pick a specific plugin to check for that single vulnerability it will check for just that.  For example, one plugin could be checking for Microsoft patch MS12-036 and Nessus gives it plugin ID of 59980, your scan will only check for that.

    However, for our purposes today we want to check for everything. Checking for everything will give you a good idea how things are with your network.

To add a new policy:
a. Click on  + New Policy button.


b. Name your scan policy
c. Click on the Credentials tab


If you are scanning Windows you can choose Windows credentials. If your targets are Linux/Unix based system you should set SSH credentials. Don’t forget, those credentials have to exist on your target system.
d. Now click on Plugins and take a look at all the plugin families. Those appear next to the green enable button.  To the right is the number of plugins that are in that family. As you can see there are plenty to choose from. Click on the names and browse around to get familiar with what types of checks it will be doing.  Click the family enable buttons as well as the plugin enable buttons in blue and notice what happens. 


e. Make sure you turn them all to green and enable for this initial scan.
f. The last tab, Preferences, we will leave alone today.
g. Make sure you click the Update button at the bottom and it should take you back to the main policy page.


  1. So now that you have a policy, it is time to create a Scan Template.
  1. Click on San Templates button at the top.
  2. Click on + New Scan Button to create a new template


  1. After you click to create a new scan template you should see the following:

  1. Make sure you name the scan
  2. Click the drop down Type and it will drop down 3 options.  Select Template


  1. After you select Template, click on the drop down for Policy.  Make sure you select the policy you just created.

  1. There will be a large box next to Scan targets.  There you will type the IP range your network is in.  (e.g. 192.168.1.1/24 , 192.168.100.1-200). Just make sure you have the right range.

  1. Click Create Template button.

    Now, you should see your new template listed in the Scan Templates tab.

  1. To run the scan:
    1. hover your curser to the right of the scan template.
    2. You should see a small triangle, click on it. 
    3. It may show a bubble that reads, Run This Template.
    4. You will be prompted to make sure you want to run the scan. If so, click Launch.


You should now see the scan start and the status should display “Running” with a percentage bar.


  1. To review your scan:
    1. Click on the Results button at the top
    2. You will see the scan name, with date and status of it.
    3. Click on the scan to open it and you should see something like this:


*Please note that I pulled results of an old sample system. 
    1. Click on the IP/bar to review details of the scan
    2. There you will be able to review each item found.

Nessus rates the finding in 5 severity levels.  Critical, High, Medium, low and informational.  You may agree or not agree on the severity level, but it is always good to review the ones with higher severity.

If you click on each one you can review details of each finding. In this example the finding is an SSL Certificate Cannot Be Trusted.

Within the details of the findings Nessus provides you with possible solutions. Please note that this is not the case for every finding.  Sometimes, it may involve upgrading software or installing a patch. However, you may find that some solutions may involve changing configurations as well.  If you find yourself not knowing what to do, you could use the power of Google to research possible solutions. 


    
By paying attention to these items and resolving them early on, you can secure your home network and take active steps towards protecting your data and devices.

If you have questions on any scan setup or even fixes, you are welcome to send an e-mail and I could write the solution as a future blog. My contact details are located below.

Ernesto Fuller is the Senior Security Administrator for JHC Technology.  He can be reached at efuller(at)jhctechnology.com or connect with him on LinkedIn.

2 comments:

  1. Great weblog here! Also your web site quite a bit up very fast! What web host are you using? Can I get your associate link to your host? I wish my web site loaded up as quickly as yours.
    earn money online without investment

    ReplyDelete
  2. Very nice blog, you given useful information, Very great article, Thank you for sharing this wonderful article.
    amazon cloud computing in india

    ReplyDelete