📄 users-manual.lyx
字号:
The password for your Nessus Server account. Don't use the same one you have for your other user accounts and especially if you ever use unencrypted connections.\layout ParagraphSSL Options\layout SubparagraphUse SSL encryption:\layout StandardFor the authentication there are two basic methods, via login/password combination or via certificate (with or without password). In any case you should switch on SSL encryption to not have the password transferred as cleartext. However, if you are in an evironment where you don't get SSL to work, switching it off is the work around to run Nessus at last.\layout SubparagraphTrusted CA:\layout StandardThis certificate defines a certificate authority (CA) you trust. With this certificate you will check that you are connecting to a trusted Nessus Server. This is checked if you have the Paranoia Level set to 2 or 3, it is not checked with a Paranoia Level of 1. Note, that you can set the Paranoia Level by hand in the nessusrc files or when first connecting to a Nessus Server where you are asked explictly.\layout StandardThe default path for the Trusted CA is the filename used by the Nessus Server itself. Thus, if you are running Nessus Client on the same maschine or have the same volume mounted, you can just use the default.\layout StandardIf you are running Nessus Client from a more remote maschine, you need to have a copy of the CA certificate and place it to some arbitrary place in your home directory.\layout SubparagraphAuthentication by Certificate:\layout StandardIf you use this method you have to have a key/certificate pair created for you. This is usually done by the administrator of Nessus Server using the corresponding scripts. The administrator will give you the two files you need to specify (User Certificate File and User Key File). The administrator may create a key without a password or with a password. If you have a password for the User Key File you must enter the password in the corresponding textentry.\layout SubsectionScan Options\layout StandardThis section explains the most important configuration options for a security scan. More special option (access rules, knowledge base detached scans) are explained later in the chapter on special features.\layout SubsubsectionGeneral\layout StandardThis page covers all the general scan options. See the screenshot for the main window above.\layout ParagraphPort range\layout StandardPorts that will be scanned by Nessus Server. You can enter single ports, such as \begin_inset Quotes eld\end_inset 1-8000\begin_inset Quotes erd\end_inset or more complex sets, such as \begin_inset Quotes eld\end_inset 21,23,25,1024-2048,6000\begin_inset Quotes erd\end_inset . Put \begin_inset Quotes eld\end_inset -1\begin_inset Quotes erd\end_inset for no portscan, or put \begin_inset Quotes eld\end_inset default\begin_inset Quotes erd\end_inset to scan the default ports in the Nessus services file.\layout ParagraphConsider unscanned ports as closed\layout StandardTo save scanning time, you may ask Nessus Server to declare TCP ports it did not scan as closed. This will result in an incomplete audit but it will reduce scanning time and prevent Nessus Server from sending packets to ports you did not specify. If this option is disabled, then Nessus Server will consider ports whose state it does not know as open.\layout ParagraphNumber of hosts to test at the same time\layout StandardMaximal number of hosts that the Nessus Server will test at the same time. Be aware that the Nessus Server will spawn max_hosts max_checks processes!\layout ParagraphNumber of checks to perform at the same time\layout StandardMaximal number of security checks that will be launched at the same time against each host. Be aware that the Nessus Server will spawn max_hosts x max_checks processes!\layout ParagraphPath to CGIs\layout StandardIt is possible to check for the presence of CGIs in multiple paths like \begin_inset Quotes eld\end_inset /cgi-bin\begin_inset Quotes erd\end_inset , \begin_inset Quotes eld\end_inset /cgis\begin_inset Quotes erd\end_inset , \begin_inset Quotes eld\end_inset /home-cgis\begin_inset Quotes erd\end_inset and so on. In that case, put all your paths here separated by colons. For instance: \begin_inset Quotes eld\end_inset /cgi-bin:/cgi-aws:/~deraison/cgi\begin_inset Quotes erd\end_inset .\layout ParagraphDo a reverse lookup of the IP before testing it\layout StandardIf this option is set, Nessus Server will do a reverse lookup on the IP addresses before it tests them. This may slow down the whole test.\layout ParagraphOptimize the test\layout StandardSecurity tests may ask the Nessus Server to be launched if and only if some information gathered by other test exist in the knowledge base, or if and only if a given port is open. This option speeds up the test, but may make Nessus Server miss some vulnerability. If you are paranoid, disable this option.\layout ParagraphSafe checks\layout StandardSome security checks may harm the target server, by disabling the remote service temporarily or until a reboot. If you enable this option, Nessus Server will rely on banners instead of actually performing a security check. You will obtain a less reliable report, but you will less likely disrupt the network users by doing a test. From a security point of view, we recommend you disable this option. From a sysadmin point of view, we recommand you enable it.\layout ParagraphDesignate hosts by their MAC address\layout StandardIf you enable this option, the hosts on the local network will be designated by their ethernet MAC address instead of their IP address. This is especially useful if you are using Nessus in a DHCP network. If unsure, disable this option.\layout ParagraphPort Scanner\layout StandardThis is the list of available port scanners. Port scanners are a special category of plugins and therefore presented separately from the other plugins. The list is only filled if a connection to a Nessus Server has been established. You can switch on one or more of the scanners. Clicking on an entry shows the details for the respecitve scanner plugin.\layout SubsubsectionPlugins\layout StandardThe plugins are stored on the Nessus Server. Thus, to make a selection of the plugins to apply you need to connect to a server. Otherwise this page will remain empty.\layout Standard\align center \begin_inset Graphics filename images/mainwindow-plugins-en.png scale 90\end_inset \layout StandardThe Plugins are separated into a number of families which can be as a whole activated or deactivated by checking the box right of family title. Also, a family can be expanded to show all of its member plugins where you can refine the selection by activating or deactivating single plugins using the checkbox to the right.\layout StandardThe column \begin_inset Quotes eld\end_inset Warning\begin_inset Quotes erd\end_inset contains warning sign for some plugins. The warning sign means that this plugin may harm the target host by disabling the attacked service or by crashing the host. You should be careful when you enable it since it may force you to reboot your servers or restart some services manually.\layout StandardBelow the plugin list the total number of plugins loaded from the server is shown, together with the total number of currently selected plugin as well as the number of plugins shown due to a applied filter.\layout StandardThe following actions are possible:\layout SubparagraphEnable all\layout StandardEnables all plugin categories.\layout SubparagraphDisable all\layout StandardDisables all plugin categories.\layout SubparagraphExpand all\layout StandardExpands the Plugin tree-list to maximum so that the list contains all plugins.\layout SubparagraphCollapse all\layout StandardOnly show the Plugin families.\layout SubparagraphEnable dependencies at runtime\layout StandardIf you enable this option, then Nessus Server will enable the plugins that are depended on by the set of plugins you selected.\layout SubparagraphSilent dependencies\layout StandardIf you enable this option, then Nessus Server will not report data coming from the plugins that you did not specifically enable.\layout SubparagraphFilter\layout StandardThe filter dialog lets you select plugins with the characteristics you want. \series bold Note\series default , that you will erase your previous selection immedialty with applying a filter.\layout ParagraphPlugin information dialog\layout StandardDouble-Clicking on a specific plugin title will raise a information dialog for the respective plugin.\layout StandardThe information shown are the ones specified within the corresponding plugin.\layout StandardThe following actions are possible in this dialog:\layout SubparagraphSet plugin timeout\layout StandardAllows to specify a timeout for the plugin.\layout SubparagraphShow dependencies\layout StandardAnother info dialog is raised listing up the dependencies for the plugin. Also it is provided a hint whether the dependencies are currently enabled or disabled.\layout SubsubsectionCredentials\layout StandardSome of the plugins allow to enter credentials to test certain applications, for example Samba or Web-Sites (HTTP). These plugins work the very same way as the plugins listed in the \begin_inset Quotes eld\end_inset Plugin Preferences\begin_inset Quotes erd\end_inset list. For better handling they are collected under \begin_inset Quotes eld\end_inset Credentials\begin_inset Quotes erd\end_inset .\layout Standard\align center \begin_inset Graphics filename images/mainwindow-credentials-en.png scale 90\end_inset \layout SubsubsectionPlugin Preferences\layout StandardSome of the plugins allow to refine with specific parameters. All of the configurable plugins' parameters are collected on this page where the user may modify the default values.\layout Standard\align center \begin_inset Graphics filename images/mainwindow-pluginprefs-en.png scale 90\end_inset \layout StandardOnly a comparably small number of plugins offers a configuration.\layout SubsubsectionTarget Selection\layout Standard\align center \begin_inset Graphics filename images/mainwindow-targetselection-en.png scale 90\end_inset \layout ParagraphTarget(s)\layout StandardThe first host(s) that will be attacked by Nessus Server. The options below allow you to extend the test to a larger set of computer. You may define several primary targets by separating them with a comma (,). ie : \begin_inset Quotes eld\end_inset host1,host2\begin_inset Quotes erd\end_inset .\layout StandardA special syntax is \begin_inset Quotes eld\end_inset file:/some/where/targetlist.txt\begin_inset Quotes erd\end_inset which means that the actual target names are loaded from that list. See for the file syntax also below the description for the button \begin_inset Quotes eld\end_inset Read from file\begin_inset Quotes erd\end_inset .\layout ParagraphRead from file\layout StandardA textfile can be specified that contains the list of targets. This textfile may contain comma-separated lists of host and also may contain many of such lines.\layout ParagraphPerform a DNS Zone transfer\layout StandardNessus Server will perform an AXFR request (that is, a zone transfer) to the target name server and will attempt to obtain the list of the hosts of the target domain. Then, it will test each host.\layout SubsectionReports\layout SubsubsectionReport Page of NessusClient\layout StandardThe report page consists of 5 elements. The size of each element can be changed to set a comfortable layout for viewing the report. The whole design is focused on supporting an explorative understanding of the scan results. The fifth element at the bottom right corner always contains the scan results for the subselection done through the first 4 elements.\layout Standard\align center \begin_inset Graphics filename images/mainwindow-report-en.png scale 90\end_inset \layout Standard
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -