Wednesday, November 2, 2022

Vulnerability Management - Nessus Plugin Types and Categories

Plugin Types ->

  1. Remote - Does not attempt/require authentication to the localhost. Instead, it remotely collects information through banner checks, testing for a patch, or exploiting a vulnerability. Some plugins may attempt to sign in to a service, but do not require localhost credentials.
  2. Local - Authenticates to a target through a service (e.g. SMB, SSH, etc) and extracts information.
  3. Combined - Collects information via remote and local checks. If local checks are unavailable, the plugin will still gather what it can from the remote checks within the plugin.
  4. Settings - Defines one or more settings used by other plugins throughout the scan.
  5. Summary - Summarizes data collected by other plugins.
  6. Third-Party - Runs a third-party application (e.g. nmap).
  7. Reputation - Uses a third-party reputation service.

Plugin Categories ->

The plugins below are listed in the order they will run during the scan.

  1. ACT_INIT - Sets KB values. Will not send network traffic. These plugins always run.
  2. ACT_SCANNER - Port scanner or pings the target
  3. ACT_SETTINGS - Sets KB values.  May send traffic over the network. Cannot be disabled.
  4. ACT_GATHER_INFO - Non-intrusive.  Generally perform banner grab or send harmless packets to host.
  5. ACT_ATTACK - Non-intrusive action which would be considered as an attack by many IDSes.
  6. ACT_MIXED_ATTACK - Non-intrusive if safe checks are enabled.  May be intrusive if safe checks are disabled.
  7. ACT_DESTRUCTIVE_ATTACK - Intrusive.  Will be noticeable this attack has been run on target.
  8. ACT_COMPLIANCE_CHECK - Non-intrusive local configuration check
  9. ACT_DENIAL - Attempts to crash service
  10. ACT_KILL_HOST - Attempts to crash host
  11. ACT_FLOOD - Attempts to flood network
  12. ACT_END - Executed last


Note: ACT_DESTRUCTIVE_ATTACK, ACT_DENIAL, ACT_KILL_HOST and ACT_FLOOD plugins are disabled by default. To enable them, disable Safe Checks within the scan policy.


Happy Learning !!

No comments:

Post a Comment

Vulnerability Management - Understanding vulnerability posture

Understanding the vulnerability posture of an organisation at a basic level helps you drive remediation efforts. So, I don't know what t...