In this article, we are going to see how to perform vulnerability assessments of network and web application by using Metasploit built-in plug-ins. First we will start with Nessus; before jumping into msfconsole, we will see how to install Nessus in BackTrack. It is quite easy; just follow the commands step by step: First download the Nessus Linux version from its official website and install it. Then register for a free license. After successfully installing Nessus, add a user by typing the following command: /opt/nessus/sbin/nessus-adduser

After triggering the command, it will ask for a user login name and a user password. For user privileges, just follow the options and it is done. Now we will register Nessus to obtain a license. So type in /opt/nessus/bin/nessus-fetch –register

After registering, it will start downloading all latest plug-ins from its official website. It will take some time to complete the whole setup. After this, it will ready for use. So let us launch msfconsole and type in load nessus.

As we can see in above figure, our Nessus plug-in is successfully loaded. Now type nessus_help and it will list all of the Nessus commands.<

Now we will connect to Nessus from our localhost to start the scans. For connecting to localhost, the command used is nessus_connect :@localhost:8834 , and here we are using nessus_connect rohit:toor@localhost:8834 ok.

As we can see here, our Nessus is authenticated. We will now check the Nessus scanning policies. For this, we type in nessus_policy_list.

My two policies, “Internal Network Scan” and “External Network Scan” are available. The first is used for scanning network vulnerabilities internally and the second is used for scanning network vulnerabilities externally. Now we are going to scan our target machine. To scan a machine, we have to create a new scan. The command used is: nessus_scan_new ; for example, here we are using nessus_scan_new 2 NEW_SCAN,

We can check the status of the scanning process by typing in nessus_scan_status, which will show us the status of the scanning process, whether it has completed or not. In our case, the scan is still running, so we will wait for some time.

After a while, our scan is completed. Now we will check our report by typing nessus_report_list; as shown below, our scan is completed.

To open the report, we use the command nessus_report_hosts ; for example, here we are using nessus_report_hosts ff2b1531-6c18-0198-9029-59ddcdb6fc3f26566c9ad609d831:

In the above screenshot, we can see that the result for the machine with the IP has a total severity of 85. This means the total number of vulnerabilities is 85. The following are the classifications of the different vulnerabilities: • Sev 0 indicates high-level vulnerabilities; there are 0. • Sev 1 indicates medium-level vulnerabilities; there are 53. • Sev 2 indicates low-level vulnerabilities; there are 20. • Sev 3 indicates informational vulnerabilities; there are 12. We may see the vulnerabilities in detail with the protocol name and services by using the command nessus_report_hosts_ports ; for example, here we are using nessus_report_host_ports ff2b1531-6c18-0198-9029-59ddcdb6fc3f26566c9ad609d831:

Now we are going to send this report to the Nessus console; for this, type in nessus_report_get ff2b1531-6c18-0198-9029 59ddcdb6fc3f26566c9ad609d831

As can be seen in the above figure, our report has been successfully imported. Now log in via Nessus Webconsole and we are able to see our imported reports.