Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Nessus Analyzer #1

Closed
saadkadhi opened this issue Feb 9, 2017 · 1 comment
Closed

Nessus Analyzer #1

saadkadhi opened this issue Feb 9, 2017 · 1 comment
Assignees
Labels
scope:analyzer Issue is analyzer related
Milestone

Comments

@saadkadhi
Copy link
Contributor

Request Type

Analyzer Request

Work Environment

Irrelevant

Analyzer Description

Create an analyzer that takes as input an IP address or a FQDN and launches a scan using Nessus by leveraging its API. That will allow the analyst to quickly assess the attack surface of the asset, the services that it is exposing on the network, their vulnerabilities, banners and so on.

Additional Details

The analyzer must not allow the analyst to launch a scan against assets that do not belong to their constituency. So it must be configured prior to use with the IP addresses, ranges, CIDR, domain names of the constituency. When an observable is submitted, it must check it against its configuration and refuses to run if it is not among or within the configured IP addresses, ranges, CIDR or domain names.

The analyzer should not allow authenticated scans as the current Cortex has no authentication and we'd risk leaking the credentials Nessus would use to authenticate. Moreover, if the asset have been compromised, an authenticated scan would tip off the attacker that something is going on. They could also capture the Nessus credentials as a result and launch lateral movements through the network.

The analyzer must not retrieve the full-fedged Nessus report by default. It should limit the information to what an analyst really needs like services, banners, critical and high severity vulnerabilities.

The analyzer must use a safe scanning policy. Instructions (in the documentation for ex.) should be provided on how to set up the policy on Nessus.

@saadkadhi saadkadhi added the scope:analyzer Issue is analyzer related label Feb 9, 2017
@saadkadhi
Copy link
Contributor Author

@guillomovitch provided an analyzer a few days ago. See PR #20. @jeromeleonard can you please test it and provide feedback?

nadouani added a commit that referenced this issue Mar 31, 2017
@nadouani nadouani modified the milestone: 1.3.0 Apr 3, 2017
jeromeleonard added a commit that referenced this issue Apr 7, 2017
jeromeleonard added a commit that referenced this issue Apr 7, 2017
@nadouani nadouani closed this as completed May 7, 2017
3c7 pushed a commit that referenced this issue May 23, 2018
check for existing hashfile downloads
jeromeleonard pushed a commit that referenced this issue Sep 3, 2018
To-om pushed a commit that referenced this issue Apr 17, 2019
Added libssl-dev to requirements
garanews pushed a commit that referenced this issue Mar 5, 2020
dadokkio pushed a commit that referenced this issue Sep 30, 2020
dadokkio pushed a commit that referenced this issue Feb 3, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
scope:analyzer Issue is analyzer related
Projects
None yet
Development

No branches or pull requests

3 participants