Vulnerability Assessment
Nessus
Downloading Nessus
To download Nessus, we can navigate to its Download Page to download the correct Nessus binary for our system. We will be downloading the Debian package for Ubuntu
for this walkthrough.
Requesting Free License
Next, we can visit the Activation Code Page to request a Nessus Activation Code, which is necessary to get the free version of Nessus:


Installing Package
With both the binary and activation code in hand, we can now install the Nessus package:
eldeim@htb[/htb]$ dpkg -i Nessus-8.15.1-ubuntu910_amd64.deb
Selecting previously unselected package nessus.
(Reading database ... 132030 files and directories currently installed.)
Preparing to unpack Nessus-8.15.1-ubuntu910_amd64.deb ...
Unpacking nessus (8.15.1) ...
Setting up nessus (8.15.1) ...
Unpacking Nessus Scanner Core Components...
Created symlink /etc/systemd/system/nessusd.service → /lib/systemd/system/nessusd.service.
Created symlink /etc/systemd/system/multi-user.target.wants/nessusd.service → /lib/systemd/system/nessusd.service.
Starting Nessus
Once we have Nessus installed, we can start the Nessus Service:
Getting Started with Nessus
eldeim@htb[/htb]$ sudo systemctl start nessusd.service
Accessing Nessus
To access Nessus, we can navigate to https://localhost:8834
. Once we arrive at the setup page, we should select Nessus Essentials
for the free version, and then we can enter our activation code:

Once we enter our activation code, we can set up a user with a secure
password for our Nessus account. Then, the plugins will begin to compile once this step is completed:

Note: The VM provided at the Nessus Skills Assessment
section has Nessus pre-installed and the targets running. You can go to that section and start the VM and use Nessus throughout the module, which can be accessed at https:// < IP >:8834
. The Nessus credentials are: htb-student
:HTB_@cademy_student!
. You may also use these credentials to SSH into the target VM to configure Nessus.
Finally, once the setup is complete, we can start creating scans, scan policies, plugin rules, and customizing settings. The Settings
page has a wealth of options such as setting up a Proxy Server or SMTP server, standard account management options, and advanced settings to customize the user interface, scanning, logging, performance, and security options.

Skills Assessment
Requirements
Navigate to the web interface at the end of this section and log in with the provided credentials.
Once logged in, perform a BASIC NETWORK SCAN
(modify the scan template to scan ALL
ports, leave all other options the same) against the target: 172.16.16.100
. Additionally, set up the scan to be authenticated using administrator:Academy_VA_adm1!
as the credentials.
The scan will take up to 60 minutes to finish.
Note: It may take 1-2 minutes for your target instance to spawn. Additionally, it may take up to an hour for the scan to run
Alternatively, use the pre-populated scan data to answer the questions below without having to wait for the scan to finish but feel free to practice configuring and running it.
Reminder: Nessus can be accessed at https:// < IP >:8834
. The Nessus credentials are: htb-student
:HTB_@cademy_student!
. You may also use these credentials to SSH into the target VM to configure Nessus.
What is the name of one of the accessible SMB shares from the authenticated Windows scan? (One word)
Nessus can be accessed at https:// < IP >:8834
. The Nessus credentials are: htb-student
:HTB_@cademy_student!
. You may also use these credentials to SSH into the target VM to configure Nessus.

Create a basic scan

Then setup the scan to be authenticated using the provided credentials
administrator:Academy_VA_adm1!

After launch, it get the name of SMB shares (the average time is the 60 minutes)
Click on "Windows_Basic_authed"
Go to the Vulnerabilities tab and search for "SMB Shares"


What was the target for the authenticated scan?

What is the plugin ID of the highest criticality vulnerability for the Windows authenticated scan?

What is the name of the vulnerability with plugin ID 26925 from the Windows authenticated scan? (Case sensitive)
Go to the scan results and filter the results with Plugin ID

Once filtered you will see only the results with the filtered criteria
Click on the vulnerability and on the title you will see the name

What port is the VNC server running on in the authenticated Windows scan?

OpenVAS
Installing Package
First, we can start by installing the tool:
eldeim@htb[/htb]$ sudo apt-get update && apt-get -y full-upgrade
eldeim@htb[/htb]$ sudo apt-get install gvm && openvas
Next, to begin the installation process, we can run the following command below:
eldeim@htb[/htb]$ gvm-setup
This will begin the setup process and take up to 30 minutes.

Starting OpenVas
Finally, we can start OpenVas:
eldeim@htb[/htb]$ gvm-start

Note: The VM provided in the
OpenVAS Skills Assessment
section has OpenVAS pre-installed and the targets running. You can go to that section and start the VM and use OpenVAS throughout the module, which can be accessed athttps://< IP >:8080
. The OpenVAS credentials are:htb-student
:HTB_@cademy_student!
. You may also use these credentials to SSH into the target VM to configure OpenVAS.
Skills Assessment
You have been contracted by the company Inlanefreight
to perform an internal vulnerability assessment against one of their servers. They have asked for a cursory assessment to be performed to identify any significant vulnerabilities as they do not have the budget for a full-scale penetration test this year. The results of this vulnerability assessment may enable the CISO to push for additional funding from the Board of Directors to perform more in-depth security testing.
The target server is a Linux Server host.
Requirements
Navigate to the OpenVAS web interface at the server below and log in with the provided credentials.
Once logged in, create a new task with the OpenVAS Default
Scanner and use the Full and Fast
config against the target: 172.16.16.160
. Additionally, ensure you have the scan set up to run as an authenticated user using the credentials: root:HTB_@cademy_admin!
.
The scan will take up to 60 minutes to finish.
Note: It may take 1-2 minutes for your target instance to spawn.
Alternatively, use the pre-populated scan data to answer the questions below without having to wait for the scan to finish but feel free to practice configuring and running it.
Reminder: OpenVAS can be accessed at
https://< IP >:8080
. The OpenVAS credentials are:htb-student
:HTB_@cademy_student!
. You may also use these credentials to SSH into the target VM to configure OpenVAS.
What type of operating system is the Linux host running? (one word)
After access to https://10.129.202.120:8080/ and the credentials provided:
This one is simple
Just go the Linux Basic Scan
Open the report
Select the OS Tab and you will see that the OS is in fact Ubuntu

What type of FTP vulnerability is on the Linux host? (Case Sensitive, four words)

What is the IP of the Linux host targeted for the scan?

What vulnerability is associated with the HTTP server? (Case-sensitive)

Last updated