SlideShare una empresa de Scribd logo
1 de 16
SOFTWARE NESSUS
Nama Kelompok :
1.Fahmi Dimyati
2.Muhammad Maulana Yasin
3.Reyhan Laksana
Apa Itu Nessus?
Nessus adalah scanner keamanan jaringan yang harus
digunakan oleh administrator system . Nessus adalah
software yang gratis dan bebas di download. Nessus
merupakan sebuah software scanning, yang dapat
digunakan untuk meng-audit kemanan sebuah
sistem, seperti vulnerability, misconfiguration,
security patch yang belum diaplikasikan, default
password, dan denial of serviceNessus berfungsi
untuk monitoring lalu-lintas jaringan.
Fitur Pada Nessus
• 1. Plug-in architecture
Setiap security test ditulis sebagai external plugin. Dengan fitur seperti ini,
kita dapat dengan mudah menambah tes yang kita inginkan tanpa harus
membaca kode dari nessusd engine
• 2. NASL (Nessus Attack Scrpiting Language)
NASL adalah sebuah bahasa yang didesain untuk menulis program security
test dengan mudah dan cepat. Selain dengan NASL, bahasa C juga dapat
digunakan untuk menulils program security test.
• 3. Up-to-date security vulnerability database.
Fitur Pada Nessus
• 4. Client-sever architecture
Nessus security scanner terdiri dari dua bagian yaitu: sebuah server yang
berfungsi sebagai pelaku serangan, dan sebuah client yang berfungsi
sebagai frontend. Client dan server dapat berjalan pada sistem yang
berbeda. Arti dari fitur ini adalah bahwa keseluruhan jaringan dapat
diaudit melalui sebuah PC,dengan server yang melakukan serangan ke
jaringan yang dituju.
• 5. Dapat mengetes jumlah host yang banyak dalam waktu yang sama.
• 6. Multiple Services
Apabila ada dua buah Web server pada host yang dituju maka Nessus akan
mengetes kedua Web server tersebut.
Fitur Pada Nessus
• 7. Smart service recognation.
Nessus tidak mempercayai host yang dituju menggunakan port standar
yang ditentukan oleh IANA. Ini berarti Nessus dapat mengenali sebuah
Web server yang berjalan pada port yang bukan merupakan port standar
(contohnya pada port8080), atau sebuah FTP server yang berjalan pada
port 31337
• 8. Complete reports.
• 9. Exportable reports.
Unix client dapat mengekspor laporan sebagai Ascii text, HTML, LaTeX, dll
Jenis audit pada
Nessus
• * credentialed and un-credentialed port scanning
• * network based vulnerability scanning
• * credentialed based patch audits for Windows and most UNIX
platforms
• * credentialed configuration auditing of most Windows and UNIX
platforms
• * robust and comprehensive credentialed security testing of 3rd party
applications
• * custom and embedded web application vulnerability testing
• * SQL database configuration auditing
• * software enumeration on Unix and Windows
• * testing anti-virus installs for out-of date signatures and configuration
errors
Jenis audit pada
Nessus
• * credentialed and un-credentialed port scanning
• * network based vulnerability scanning
• * credentialed based patch audits for Windows and most UNIX
platforms
• * credentialed configuration auditing of most Windows and UNIX
platforms
• * robust and comprehensive credentialed security testing of 3rd party
applications
• * custom and embedded web application vulnerability testing
• * SQL database configuration auditing
• * software enumeration on Unix and Windows
• * testing anti-virus installs for out-of date signatures and configuration
errors
Spesifikasi Hardware
Pada Nesssus
Nessus Hardware Requirements
Scenario Minimum Recommended Hardware
Nessus managing up to 50,000
hosts
CPU: 1 dual-core 2 GHz CPU
Memory: 2 GB RAM (4 GB RAM recommended)
Disk space: 30 GB
Nessus managing more than
50,000 hosts
CPU: 1 dual-core 2 GHz CPU (2 dual-core
recommended)
Memory: 2 GB RAM (8 GB RAM recommended)
Disk space: 30 GB (Additional space may be
needed for reporting)
Suggested Nessus Manager Hardware Requirements
Scenario Minimum Recommended Hardware
Nessus Manager managing
30,000 agents
CPU: Multiple cores, but prioritize the number of GHz
over the number of cores.
Memory: 64 GB RAM
Spesifikasi Software
untuk Nesssus
• Nessus Manager and Nessus Professional
• Operating System Supported Versions
• Linux • Debian 6, 7, and 8 / Kali Linux 1, 2, and Rolling - i386
• Debian 6, 7, and 8 / Kali Linux 1, 2, and Rolling - AMD64
• Red Hat ES 5 / CentOS 5 / Oracle Linux 5 (including Unbreakable Enterprise Kernel) - i386
• Red Hat ES 5 / CentOS 5 / Oracle Linux 5 (including Unbreakable Enterprise Kernel) - x86_64
• Red Hat ES 6 / CentOS 6 / Oracle Linux 6 (including Unbreakable Enterprise Kernel) - i386
• Red Hat ES 6 / CentOS 6 / Oracle Linux 6 (including Unbreakable Enterprise Kernel) - x86_64
• Red Hat ES 7 / CentOS 7 / Oracle Linux 7 (including Unbreakable Enterprise Kernel) - x86_64
• FreeBSD 10 - AMD64
• Fedora 20 and 21 - x86_64
• SUSE 10.0 Enterprise - x86_64
• SUSE 11 Enterprise - i586
• SUSE 11 Enterprise - x86_64
• Ubuntu 11.10, 12.04, 12.10, 13.04, 13.10, 14.04, and 16.04 - i386
• Ubuntu 11.10, 12.04, 12.10, 13.04, 13.10, 14.04, and 16.04 - AMD64
• Windows • Windows 7, 8, and 10 - i386
• Windows Server 2008, Server 2008 R2*, Server 2012, Server 2012 R2, Server 2016, 7, 8, and 10 - x86-64
• Tip: Windows Server 2008 R2’s bundled version of Microsoft IE does not interface with a Java installation properly. This
causes Nessus to not perform as expected in some situations: Microsoft’s policy recommends not using MSIE on server
operating systems.
• For increased performance and scan reliability when installing on a Windows platform, it is highly recommended that
Nessus be installed on a server product from the Microsoft Windows family such as Windows Server 2008 R2.
• Mac OS X Mac OS X 10.8, 10.9, 10.10, 10.11, and 10.12 - x86-64
Kelemahan dan
Kelebihan
ITEM ADVANTAGE DISADVANTAGE
Single server performs scans and captures results to a
database
High-performance capture of data with minimum results
reporting impact on the network.
Forces centralized server architecture where all scans take
place from a single server.
Open-source product Low cost of ownership. Can be customized by the end user
with technical knowledge.
No support without extra fee. Requires greater knowledge
to install and operate the product.
The user can compile binary Operates on multiple platforms: OSs/CPUs. Requires strong knowledge about the target systems and
open-source software.
Optimized version of Nessus is recommended for scanning
Windows XP SP2 platforms to avoid false negatives
Scalability problem: If your organization has a mix of architectures (e.g., Linux and Windows), then it is possible that two
versions may come into use, or you are better off using a Windows version.
Professional feeds provide immediate updates Receiving immediate updates for latest vulnerabilities is
obviously good.
You must pay for this but the cost is likely the same or
cheaper than other products.
Home feeds provide free vulnerability updates This is a good way to get started evaluating the tool. This is not for commercial use.
Plug-ins These elements of Nessus allow for extensibility and
customization commonly beyond what other products
offer.
The increased complexity requires considerable knowledge
and experience to deploy.
NASL[*] This tool allows the user to script and run specific
vulnerability checks. These checks provide a lot of control
where most products do not.
Knowledge of NASL and how to use it at the command line
is necessary.
[*] Nessus Attack Scripting Language
Tampilan-Tampilan
aplikasi nessus
Tampilan Menu Plugins dan preferences
Tampilan-Tampilan
aplikasi nessus
Tampilan Menu Reports
Tampilan-Tampilan
aplikasi nessus
Tampilan Menu Reports detail
Tampilan-Tampilan
aplikasi nessus
Tampilan Nessus yang telah aktif
Tampilan-Tampilan
aplikasi nessus
Tampilan Log report completed
Tampilan-Tampilan
aplikasi nessus
Tampilan report low pada host server

Más contenido relacionado

La actualidad más candente

Linux Yaz Kampı 2017 GNU/Linux Eğitim Dökümanı
Linux Yaz Kampı 2017 GNU/Linux Eğitim DökümanıLinux Yaz Kampı 2017 GNU/Linux Eğitim Dökümanı
Linux Yaz Kampı 2017 GNU/Linux Eğitim Dökümanıİbrahim UÇAR
 
kali linux Presentaion
 kali linux Presentaion kali linux Presentaion
kali linux PresentaionDev Gandhi
 
KD 3.10 FIREWALL JARINGAN.pptx
KD 3.10 FIREWALL JARINGAN.pptxKD 3.10 FIREWALL JARINGAN.pptx
KD 3.10 FIREWALL JARINGAN.pptxZulmiArifah2
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012anilinvns
 
Prosedur Instalasi Server Softswitch Berbasis SIP
Prosedur Instalasi Server Softswitch Berbasis SIPProsedur Instalasi Server Softswitch Berbasis SIP
Prosedur Instalasi Server Softswitch Berbasis SIPFanny Fayu Laksono
 
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Walid Umar
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
OpenVAS
OpenVASOpenVAS
OpenVASsvm
 
Manual configuracion políticas
Manual configuracion políticasManual configuracion políticas
Manual configuracion políticasYimy Pérez Medina
 
Comandos cisco ccna_exploration
Comandos cisco ccna_explorationComandos cisco ccna_exploration
Comandos cisco ccna_explorationWhaleejaa Wha
 
Temel kullanici gruplari
Temel kullanici gruplariTemel kullanici gruplari
Temel kullanici gruplarimimarsinantl
 

La actualidad más candente (20)

Linux Yaz Kampı 2017 GNU/Linux Eğitim Dökümanı
Linux Yaz Kampı 2017 GNU/Linux Eğitim DökümanıLinux Yaz Kampı 2017 GNU/Linux Eğitim Dökümanı
Linux Yaz Kampı 2017 GNU/Linux Eğitim Dökümanı
 
Laporan 2 instalasi dan konfigurasi Lan
Laporan 2 instalasi dan konfigurasi LanLaporan 2 instalasi dan konfigurasi Lan
Laporan 2 instalasi dan konfigurasi Lan
 
kali linux Presentaion
 kali linux Presentaion kali linux Presentaion
kali linux Presentaion
 
KD 3.10 FIREWALL JARINGAN.pptx
KD 3.10 FIREWALL JARINGAN.pptxKD 3.10 FIREWALL JARINGAN.pptx
KD 3.10 FIREWALL JARINGAN.pptx
 
BTRisk Android Mobil Uygulama Denetimi Eğitimi
BTRisk Android Mobil Uygulama Denetimi EğitimiBTRisk Android Mobil Uygulama Denetimi Eğitimi
BTRisk Android Mobil Uygulama Denetimi Eğitimi
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Monitoring jaringan komputer
Monitoring jaringan komputerMonitoring jaringan komputer
Monitoring jaringan komputer
 
Prosedur Instalasi Server Softswitch Berbasis SIP
Prosedur Instalasi Server Softswitch Berbasis SIPProsedur Instalasi Server Softswitch Berbasis SIP
Prosedur Instalasi Server Softswitch Berbasis SIP
 
Kali linux
Kali linuxKali linux
Kali linux
 
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
Soal USBN TKJ - Teori Kompetensi Keahlian Jaringan TP. 2019/2020
 
Sızma Testleri Sonuç Raporu
Sızma Testleri Sonuç RaporuSızma Testleri Sonuç Raporu
Sızma Testleri Sonuç Raporu
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
OpenVAS
OpenVASOpenVAS
OpenVAS
 
Manual configuracion políticas
Manual configuracion políticasManual configuracion políticas
Manual configuracion políticas
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
Comandos cisco ccna_exploration
Comandos cisco ccna_explorationComandos cisco ccna_exploration
Comandos cisco ccna_exploration
 
Nikto
NiktoNikto
Nikto
 
Linux sunum
Linux sunumLinux sunum
Linux sunum
 
SELinux Basic Usage
SELinux Basic UsageSELinux Basic Usage
SELinux Basic Usage
 
Temel kullanici gruplari
Temel kullanici gruplariTemel kullanici gruplari
Temel kullanici gruplari
 

Similar a nessus

20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsxSuman Garai
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesSam Bowne
 
Systems administration for coders presentation
Systems administration for coders presentationSystems administration for coders presentation
Systems administration for coders presentationMatt Willsher
 
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...Andre Essing
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...xKinAnx
 
Netxms install guide
Netxms install guideNetxms install guide
Netxms install guideNaga Raju N
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesSam Bowne
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesSam Bowne
 
Develop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM BoardsDevelop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM BoardsNational Cheng Kung University
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesSam Bowne
 
Nessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdfNessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdffckindswear
 
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]Krisman Tarigan
 
Santosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - ResumeSantosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - ResumeSantosh Yadav
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011Aravindan Arun
 
Nessus Software
Nessus SoftwareNessus Software
Nessus SoftwareMegha Sahu
 
Adding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpecAdding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpecMandi Walls
 

Similar a nessus (20)

20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx20210906-Nessus-FundamentalInfoSec.ppsx
20210906-Nessus-FundamentalInfoSec.ppsx
 
Chapter 5.0
Chapter 5.0Chapter 5.0
Chapter 5.0
 
Ch05 system administration
Ch05 system administration Ch05 system administration
Ch05 system administration
 
Ch05
Ch05Ch05
Ch05
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
Systems administration for coders presentation
Systems administration for coders presentationSystems administration for coders presentation
Systems administration for coders presentation
 
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
Netxms install guide
Netxms install guideNetxms install guide
Netxms install guide
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
 
Develop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM BoardsDevelop Your Own Operating Systems using Cheap ARM Boards
Develop Your Own Operating Systems using Cheap ARM Boards
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Nessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdfNessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe how it is .pdf
 
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
18587936 squid-proxy-configuration-guide - [the-xp.blogspot.com]
 
Santosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - ResumeSantosh Yadav Mar-2015 - Resume
Santosh Yadav Mar-2015 - Resume
 
Advance linux presentation_0702011
Advance linux presentation_0702011Advance linux presentation_0702011
Advance linux presentation_0702011
 
Nessus
NessusNessus
Nessus
 
Nessus Software
Nessus SoftwareNessus Software
Nessus Software
 
Adding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpecAdding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpec
 

Último

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Último (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

nessus

  • 1. SOFTWARE NESSUS Nama Kelompok : 1.Fahmi Dimyati 2.Muhammad Maulana Yasin 3.Reyhan Laksana
  • 2. Apa Itu Nessus? Nessus adalah scanner keamanan jaringan yang harus digunakan oleh administrator system . Nessus adalah software yang gratis dan bebas di download. Nessus merupakan sebuah software scanning, yang dapat digunakan untuk meng-audit kemanan sebuah sistem, seperti vulnerability, misconfiguration, security patch yang belum diaplikasikan, default password, dan denial of serviceNessus berfungsi untuk monitoring lalu-lintas jaringan.
  • 3. Fitur Pada Nessus • 1. Plug-in architecture Setiap security test ditulis sebagai external plugin. Dengan fitur seperti ini, kita dapat dengan mudah menambah tes yang kita inginkan tanpa harus membaca kode dari nessusd engine • 2. NASL (Nessus Attack Scrpiting Language) NASL adalah sebuah bahasa yang didesain untuk menulis program security test dengan mudah dan cepat. Selain dengan NASL, bahasa C juga dapat digunakan untuk menulils program security test. • 3. Up-to-date security vulnerability database.
  • 4. Fitur Pada Nessus • 4. Client-sever architecture Nessus security scanner terdiri dari dua bagian yaitu: sebuah server yang berfungsi sebagai pelaku serangan, dan sebuah client yang berfungsi sebagai frontend. Client dan server dapat berjalan pada sistem yang berbeda. Arti dari fitur ini adalah bahwa keseluruhan jaringan dapat diaudit melalui sebuah PC,dengan server yang melakukan serangan ke jaringan yang dituju. • 5. Dapat mengetes jumlah host yang banyak dalam waktu yang sama. • 6. Multiple Services Apabila ada dua buah Web server pada host yang dituju maka Nessus akan mengetes kedua Web server tersebut.
  • 5. Fitur Pada Nessus • 7. Smart service recognation. Nessus tidak mempercayai host yang dituju menggunakan port standar yang ditentukan oleh IANA. Ini berarti Nessus dapat mengenali sebuah Web server yang berjalan pada port yang bukan merupakan port standar (contohnya pada port8080), atau sebuah FTP server yang berjalan pada port 31337 • 8. Complete reports. • 9. Exportable reports. Unix client dapat mengekspor laporan sebagai Ascii text, HTML, LaTeX, dll
  • 6. Jenis audit pada Nessus • * credentialed and un-credentialed port scanning • * network based vulnerability scanning • * credentialed based patch audits for Windows and most UNIX platforms • * credentialed configuration auditing of most Windows and UNIX platforms • * robust and comprehensive credentialed security testing of 3rd party applications • * custom and embedded web application vulnerability testing • * SQL database configuration auditing • * software enumeration on Unix and Windows • * testing anti-virus installs for out-of date signatures and configuration errors
  • 7. Jenis audit pada Nessus • * credentialed and un-credentialed port scanning • * network based vulnerability scanning • * credentialed based patch audits for Windows and most UNIX platforms • * credentialed configuration auditing of most Windows and UNIX platforms • * robust and comprehensive credentialed security testing of 3rd party applications • * custom and embedded web application vulnerability testing • * SQL database configuration auditing • * software enumeration on Unix and Windows • * testing anti-virus installs for out-of date signatures and configuration errors
  • 8. Spesifikasi Hardware Pada Nesssus Nessus Hardware Requirements Scenario Minimum Recommended Hardware Nessus managing up to 50,000 hosts CPU: 1 dual-core 2 GHz CPU Memory: 2 GB RAM (4 GB RAM recommended) Disk space: 30 GB Nessus managing more than 50,000 hosts CPU: 1 dual-core 2 GHz CPU (2 dual-core recommended) Memory: 2 GB RAM (8 GB RAM recommended) Disk space: 30 GB (Additional space may be needed for reporting) Suggested Nessus Manager Hardware Requirements Scenario Minimum Recommended Hardware Nessus Manager managing 30,000 agents CPU: Multiple cores, but prioritize the number of GHz over the number of cores. Memory: 64 GB RAM
  • 9. Spesifikasi Software untuk Nesssus • Nessus Manager and Nessus Professional • Operating System Supported Versions • Linux • Debian 6, 7, and 8 / Kali Linux 1, 2, and Rolling - i386 • Debian 6, 7, and 8 / Kali Linux 1, 2, and Rolling - AMD64 • Red Hat ES 5 / CentOS 5 / Oracle Linux 5 (including Unbreakable Enterprise Kernel) - i386 • Red Hat ES 5 / CentOS 5 / Oracle Linux 5 (including Unbreakable Enterprise Kernel) - x86_64 • Red Hat ES 6 / CentOS 6 / Oracle Linux 6 (including Unbreakable Enterprise Kernel) - i386 • Red Hat ES 6 / CentOS 6 / Oracle Linux 6 (including Unbreakable Enterprise Kernel) - x86_64 • Red Hat ES 7 / CentOS 7 / Oracle Linux 7 (including Unbreakable Enterprise Kernel) - x86_64 • FreeBSD 10 - AMD64 • Fedora 20 and 21 - x86_64 • SUSE 10.0 Enterprise - x86_64 • SUSE 11 Enterprise - i586 • SUSE 11 Enterprise - x86_64 • Ubuntu 11.10, 12.04, 12.10, 13.04, 13.10, 14.04, and 16.04 - i386 • Ubuntu 11.10, 12.04, 12.10, 13.04, 13.10, 14.04, and 16.04 - AMD64 • Windows • Windows 7, 8, and 10 - i386 • Windows Server 2008, Server 2008 R2*, Server 2012, Server 2012 R2, Server 2016, 7, 8, and 10 - x86-64 • Tip: Windows Server 2008 R2’s bundled version of Microsoft IE does not interface with a Java installation properly. This causes Nessus to not perform as expected in some situations: Microsoft’s policy recommends not using MSIE on server operating systems. • For increased performance and scan reliability when installing on a Windows platform, it is highly recommended that Nessus be installed on a server product from the Microsoft Windows family such as Windows Server 2008 R2. • Mac OS X Mac OS X 10.8, 10.9, 10.10, 10.11, and 10.12 - x86-64
  • 10. Kelemahan dan Kelebihan ITEM ADVANTAGE DISADVANTAGE Single server performs scans and captures results to a database High-performance capture of data with minimum results reporting impact on the network. Forces centralized server architecture where all scans take place from a single server. Open-source product Low cost of ownership. Can be customized by the end user with technical knowledge. No support without extra fee. Requires greater knowledge to install and operate the product. The user can compile binary Operates on multiple platforms: OSs/CPUs. Requires strong knowledge about the target systems and open-source software. Optimized version of Nessus is recommended for scanning Windows XP SP2 platforms to avoid false negatives Scalability problem: If your organization has a mix of architectures (e.g., Linux and Windows), then it is possible that two versions may come into use, or you are better off using a Windows version. Professional feeds provide immediate updates Receiving immediate updates for latest vulnerabilities is obviously good. You must pay for this but the cost is likely the same or cheaper than other products. Home feeds provide free vulnerability updates This is a good way to get started evaluating the tool. This is not for commercial use. Plug-ins These elements of Nessus allow for extensibility and customization commonly beyond what other products offer. The increased complexity requires considerable knowledge and experience to deploy. NASL[*] This tool allows the user to script and run specific vulnerability checks. These checks provide a lot of control where most products do not. Knowledge of NASL and how to use it at the command line is necessary. [*] Nessus Attack Scripting Language