-
Notifications
You must be signed in to change notification settings - Fork 384
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Nessus Analyzer #1
Comments
@guillomovitch provided an analyzer a few days ago. See PR #20. @jeromeleonard can you please test it and provide feedback? |
nadouani
added a commit
that referenced
this issue
Mar 31, 2017
jeromeleonard
added a commit
that referenced
this issue
Apr 7, 2017
jeromeleonard
added a commit
that referenced
this issue
Apr 7, 2017
jeromeleonard
added a commit
that referenced
this issue
Apr 7, 2017
jeromeleonard
pushed a commit
that referenced
this issue
Sep 3, 2018
nusantara-self
pushed a commit
that referenced
this issue
Feb 6, 2025
Update elk.py to not fail when @timestamp has no mapping
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Request Type
Analyzer Request
Work Environment
Irrelevant
Analyzer Description
Create an analyzer that takes as input an IP address or a FQDN and launches a scan using Nessus by leveraging its API. That will allow the analyst to quickly assess the attack surface of the asset, the services that it is exposing on the network, their vulnerabilities, banners and so on.
Additional Details
The analyzer must not allow the analyst to launch a scan against assets that do not belong to their constituency. So it must be configured prior to use with the IP addresses, ranges, CIDR, domain names of the constituency. When an observable is submitted, it must check it against its configuration and refuses to run if it is not among or within the configured IP addresses, ranges, CIDR or domain names.
The analyzer should not allow authenticated scans as the current Cortex has no authentication and we'd risk leaking the credentials Nessus would use to authenticate. Moreover, if the asset have been compromised, an authenticated scan would tip off the attacker that something is going on. They could also capture the Nessus credentials as a result and launch lateral movements through the network.
The analyzer must not retrieve the full-fedged Nessus report by default. It should limit the information to what an analyst really needs like services, banners, critical and high severity vulnerabilities.
The analyzer must use a safe scanning policy. Instructions (in the documentation for ex.) should be provided on how to set up the policy on Nessus.
The text was updated successfully, but these errors were encountered: