Scanning
Vulnerability Scanning
By this point you should be ready to start and already have completed these things:
- Signed Rules of Engagement
- Scoping information
- Validated scope
- Sent kickoff email
Nessus
tenable.com/products/nessus $$$
Nessus Essentials is free:
tenable.com/products/nessus/nessus-essentials
Alternatives to Nessus
- Astra Pentest
- Indusface WAS
- Invicti (formerly Netsparker)
- Intruder
- ManageEngine Vulnerability Manager Plus
- Acunetix
- Open VAS
- Metasploit
- Burp Suite
- Qualys Cloud Platform
- Tennable.io
- OpenSCAP
- Tripwire
Scan Demo
Demo is based on tesla at bugcrowd. bugcrowd.com/tesla
To use bugcrowd.com you needs an account set up and configured.
Note: In this case you would need to find out if automated scanning is out of scope.
Steps
Interface is probably different now and steps may have changed.
- Nessus - Advanced Scan
- Name, description.
- Targets: paste in IP address from scope.
- Schedule: you can set when it will run.
- Discovery: usually left at default for external.
- Port Scanning: 1-65535
- Service Discovery: leave as default.
- Web Applications: Turn on Scan web applications.
- Check through the rest of the settings and understand what they are for.