OVERVIEW:
Nessus is a remote security scanning tool, that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. Nessus employs the Nessus Attack Scripting Language (NASL), a simple language that describes individual threats and potential attacks.
GET STARTED
To verify the installation, follow the below instructions
Step 1. Connect to SSH:
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.
In the navigation pane, choose Instances.
Select the instance and choose Connect.
Choose SSH Client
Copy the SSH command and paste it into the terminal.
ssh rocky@publicIP -i [Path of key pair file]
If it shows an access denied message run the following command, then run the above command again to connect via ssh.
chmod 400 [Path of key pair file]
Once launched in the Amazon EC2 Service, please connect to the instance via an SSH client using the ec2-user with the key pair associated at launch. Once connected as the ec2-user user, you will be able to sudo to the root user by issuing the below command.
Data Store Region Name Location: US East (N. Virginia)
To monitor and assess application functions:-
a. Navigate to your Amazon EC2 console and verify that you're in the correct region.
b. Choose Instances and select your launched instance.
c. Select the server to display your metadata page and choose the Status checks tab at the bottom of the page to review if your status checks passed or failed.
Access and Security
Please update the security group of the target instance to allow the below ports and protocols for access and connectivity.
To add a rule to a security group for inbound SSH traffic over IPv4:
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/
From the top navigation bar, select a Region for the security group. Security groups are specific to a Region, so you should select the same Region in which you created your instance.
In the navigation pane, choose Instances.
Select your instance and, in the bottom half of the screen, choose the Security tab. Security groups list the security groups that are associated with the instance. Inbound rules display a list of the inbound rules that are in effect for the instance.
For the security group to which you'll add the new rule, choose the security group ID link to open the security group.
On the Inbound Rules tab, choose Edit inbound rules.
On the Edit inbound rules page, do the following:
Choose Add rule.
For Type, choose SSH, HTTP, Custom TCP
In Custom TCP add in the Port range - 8834 ( For application Dashboard)
For Source, choose Custom and then choose in the CIDR block 0.0.0.0/0
Choose Save rules.
Step 2. Verify the installation
Follow the steps to verify the installation and Login
Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.
In the navigation pane, choose Instances and select your instance.
The following information is available on the Networking tab: Public IPv4 address
Copy its public IP.
Paste the public IP into a new browser tab (do not hit enter yet)
Append:8834 to the end of the public IP.
https://<Public id>:8834
7. Hit Enter then the Nessus Welcome dashboard will open.
8. Select Nesses Essentials and click on Continue
7. Fill up all these details and then click on Email Button.
8. After clicking on the Email button then kindly check your email to get your activation code.
9. Copy that activation code and paste it into your activation code.
9. Then create your credentials username and password and then click on Submit button.
10. After clicking on submit button then wait for a minute to complete downloading plugins.
11 After completing the downloading plugins the Nessus dashboard will open.
For details on how to use this application please visit: https://www.tenable.com/blog/how-to-run-your-first-vulnerability-scan-with-nessus
For detailed information about managing and requesting increased service please visit: https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html
Comments