Scan for the latest vulnerabilities using Nessus and download detailed vulnerability reports in HTML and CSV format with Nessus Add-on for Sn1per Professional!
- Integrate with Nessus to scan for the latest CVE’s and vulnerabilities
- Download detailed vulnerability reports in HTML and CSV format.
- Import all vulnerabilities into Sn1per Professional
This add-on requires a Sn1per Professional v9.0 license along with the following add-ons and components:
- Command Execution Add-on v2.0
- Nessus Add-on v2.0
- Nessus v10.x
This assumes that you already have a working Nessus installation running the latest version (10.x). If not, you can obtain a free Nessus license from https://www.tenable.com/downloads/nessus?loginAttempted=true
After Nessus is installed, follow the steps below to install the Nessus add-on:
/etc/init.d/nessusd startto start the Nessus service
- Open a new browser window and go to: https://127.0.0.1:8834/#/ and login to confirm your Nessus installation
- Extract contents of nessus-add-on-v2.tar.gz to /tmp/
cd tmp tar -zxvf nessus-add-on-v2.tar.gz
- Run install-nessus-add-on.sh script as ‘root’:
sudo bash install-nessus-add-on.sh
- Add your Nessus host/IP, username and password to your /root/.sniper.conf file or create a separate Sn1per configuration template under /usr/share/sniper/conf/ (see here for details on creating dynamic configuration templates) to enable Nessus scanning in Sn1per:
# NESSUS CONFIG VULNSCAN="1" NESSUS="1" NESSUS_HOST="127.0.0.1:8834" NESSUS_USERNAME="admin" NESSUS_PASSWORD='your_password_here' NESSUS_POLICY_ID="c3cbcd46-329f-a9ed-1077-554f8c2af33d0d44f09d736969bf" #DEFAULT POLICY
Selecting A Scan Policy
- To select a different scan policy to use for the scan, you will need to use web developer tools while accessing the Nessus web UI. To do this, click the “Policies” menu and click on the policy you want to use for Sn1per scans and click “Save”. Under the “Network” tab in web developer tools, you will see a “PUT” request with the UUID of the policy on the request body. You will need to update your Sn1per conf NESSUS_POLICY_ID setting with this value prior to running the scan.
7. Run a test vuln scan to confirm your installation:
sniper -t 127.0.0.1 -m vulnscan -w 127.0.0.1
For multi-host scans, you can also use
sniper -f targets.txt -m massvulnscan -w targets command.
NOTE: This can also be done using the Command Execution Add-on from the web UI.
After the scan(s) complete, results will be shown in the workspace report view under the “Vulnerabilities” section and from the host report as well as the “Vulnerability Report Viewer“.