Die Tenable Network Security, Inc. hat ihren Verwundbarkeitsscanner Nessus in der Version 5.0 veröffentlicht. Die neue Version des Scanners wurde bzgl. Benutzerfreundlichkeit, Effizienz und Berichtgenerierung verbessert.
Nessus dient wie der freie Fork OpenVAS zum Aufspüren von Sicherheitslücken. Nessus steht unter einer proprietären Lizenz, ist jedoch für den Einsatz im heimischen Netzwerk kostenlos. Laut Tenable lässt sich Nessus 5 innerhalb weniger Minuten installieren und einrichten. So gut wie alle Einstellungen lassen sich in einer webbasierten Nutzerschnittstelle vornehmen, die in Adobe Flex umgesetzt wurde. Mit mehr als zwei Dutzend neuen Filtern können Anwender schnell und einfach neue Richtlinien für zu prüfende Rechner anlegen und so sicherstellen, dass sie gefährliche Schwachstellen schnell ausmachen können.
In Nessus werden die Ergebisse eines Schwachstellenscans in Echtzeit angezeigt und sofort gefiltert. So können Systemadministratoren theoretisch bereits damit beginnen, Sicherheitslücken zu stopfen während das System noch getestet wird. Wurde eine Schwachstelle gefunden, können zu dieser mit einem Klick weitere Informationen abgerufen werden. Die von Nessus 5 erstellten Berichte lassen sich dank verschiedener Filter und der Ergebnisverwaltung leicht an verschiedene Bedürfnisse und Zielgruppen wie anpassen. Einzelne Vorlagen für Berichte lassen sich miteinander kombinieren und zu einem ausführlichen Bericht zusammenfassen. Der Schwachstellenscanner kann die Berichte in verschiedenen Formaten ausgeben.
Nessus 5 kann momentan auf über 47600 Plugins mit Exploit-Code zurückgreifen. Die Plugins werden kontinuierlich um neue ergänzt. Im Vergleich zur professionellen Version werden die Plugins für den Heimgebrauch jedoch mit einer geringen Verzögerung aktualisiert. Nessus 5 ist für Linux, Mac OS X und MS Windows erhältlich (http://www.nessus.org/products/nessus/nessus-download-agreement). Tenable stellt Binärpakete für 32- und 64-Bit-Versionen verschiedener Linux-Distributionen bereit. Für die Inbetriebnahme ist ein Aktivierungscode erforderlich.
(http://www.pro-linux.de/images/NB3/imgdb/o_nessus-5.jpg)
Nessus 5
Quelle: www.pro-linux.de
Changelog
New Features:
Nessus Cloud UI Enhancements -- improved workflow and dashboards
Nessus Cloud no longer supports Internet Explorer 10 and under
Nessus Agents now support running on Windows 10 and Debian 8
Nessus Professional, Nessus Manager, and managed Nessus scanners now support running on Windows 10, Debian 8, and Kali 2.0
Added the ability to detect malware on the filesystem in addition to in memory
Add the "Internal Network PCI Scan" template to Nessus Cloud
Upgrade Nessus certificates to SHA-256
Bug Fixes:
Custom compliance audit info not showing in api call showing policy details
Various related to Agent/Manager comms with IPv6 available
Scan name missing from email subject and report on emailed Nessus Agent scan results
Upgrade from 5.2.12 to 6.5 breaks a Host Discovery scan
Don't unlink Windows Agent during upgrade if linked
Fixes for IPv6-related issues on scanners
Agents can link to manager via /etc/hosts entry, but will not receive scan jobs
Nessus SYN scanner doesn't respect port rules
Debian/Ubuntu init script status returning incorrect error code when Nessus is stopped
Remote scanners don't update based on update commands issued on status page in Nessus Manager
Submitting API request for PUT /policies with invalid format will incorrectly return HTTP OK (Status code 200)
Offline Config Audit filenames not saving correctly after being changed
Update Host Discovery templates to only use accounts specified in policy by default
Plugin 46215 Inaccurate Output from Agent Scans
XSS via import of malicious Nessus DB file
Nessus server crash via XML entities processing bomb
Aliasing additional IP Addresses results in Nessus agents reporting incorrect IP
TCP Port Scans not working in Nessus Cloud
http://www.nessus.org/
Changelog
The following are security updates included in Nessus 10.4.1:
Updated OpenSSL to 3.0.7 to address two high-severity security vulnerabilities.
Updated the libexpat library to 2.5.0 to address a security vulnerability.
Bug Fix:
Increased the Nessus Manager node update payload size.
New in Nessus 10.4.0
New Features:
The following are the new features included in Nessus 10.4.0:
You can now activate new Nessus Professional and Nessus Expert trials from within the application when you start Nessus for the first time.
Nessus Expert users can now view Terrascan results and generate reports from the Nessus Expert user interface.
You can now log in and perform some operations while Nessus compiles plugins.
You can now manage multiple agents at once by using bulk commands from the Nessus Manager user interface.
Nessus usernames can now contain parentheses — "(" and ")".
Nessus now has improved log rotation flexibility.
Nessus now supports FIPS mode communications.
Nessus now has improved TLS 1.3 support due to the following additions:
The ChaCha20 stream cipher with the Poly1305 message authentication code.
The Ed25519 and Ed448 digital signature algorithms.
The x25519 and x448 key exchange protocols.
Changed Functionality and Performance Enhancements:
The following enhancements are included in Nessus 10.4.0:
You can now make copies of scan templates.
ASM scan efficiency improvements.
Report queue processing improvements.
Scan note language improvements.
Changed Functionality and Performance Enhancements:
The following are security updates included in Nessus 10.4.0:
Updated the following libraries to address several vulnerabilities:
Updated datatables to 1.12.1.
Updated jquery-ui to 1.13.2.
Updated less.js to 4.1.3.
Updated moment.js to 2.29.4.
Updated select2.js to 4.0.13.
Updated underscore.js to 1.13.4.
Updated zlib to 1.2.13.
For more information, see the Tenable Product Security Advisory.
Fixed an input validation issue for some input fields that relied on client-side validation.
Updated Nessus Manager linking so that linking keys for agents, scanners, and nodes are now different from each other.
New in Nessus 10.3.1
Security Updates:
The following are security updates included in Nessus 10.3.1:
Updated the following libraries to address several vulnerabilities:
Updated datatables to 1.12.1.
Updated moment.js to 2.29.4.
Updated libexpat to 2.4.9.
Updated libxml2 to 2.10.3.
Updated zlib to 1.2.13.
Upgrade Notes:
If you are upgrading to Nessus Expert from a previous version of Nessus, you must upgrade Nessus to 10.3 prior to performing the Expert upgrade.
Due to the dynamic plugin compilation update, Nessus customers who have custom plugins could experience compilation failures if their plugins do not adhere to the updated standards outlined in the NASL Library Optimization guide. We recommend that customers with custom plugins review this guide and make any necessary updates before updating to Nessus 10.0.x.
You can upgrade to the latest version of Nessus from any previously supported version.
If your upgrade path skips versions of Nessus, Tenable recommends reviewing the release notes for all skipped versions to learn about new features and bug fixes.
If you want your scanners to automatically update to the newest version before the GA date, set your Nessus Update Plan to Opt in to Early Access releases.
If you want to manually update your scanners to the latest version before the GA date, disable automatic updates so the scanner does not automatically downgrade to the previous version.
For Nessus 8.8.0 and later running on Windows, you must install Visual C++ Redistributable for Visual Studio 2015 on the host operating system. The following Windows versions require a minimum Service Pack to be installed:
Windows 7 SP1
Windows Server 2008 SP2
Windows Server 2008 R2 SP1
https://www.tenable.com/products/nessus/nessus-professional
(https://i.postimg.cc/kM6bQ5Yy/Nessus.png)
Attack Surface Analyzer is developed by the Microsoft Security Engineering Center (MSEC). It is the same tool used by Microsoft's internal product groups to catalog changes made to the operating system attack surface by installing new software.
MIT License
Whats new:>>
Fixes some reported issues ( #668 )
https://github.com/microsoft/AttackSurfaceAnalyzer
Changelog
New Features:
Added Docker support for Tenable.sc-managed scanners. For more information, see Deploy Nessus as a Docker Image.
Added the ability to save custom filter configurations. For more information, see Search and Filter Results.
Improved the activation workflow of purchased products. Activating previously purchased products is now easier. For more information, see Configure Nessus.
Expanded VPR for Nessus Professional and Nessus Expert.
Updated the Nessus Manager Sensors tab to show agent UUIDs.
Enhanced Attack Surface Discovery results filtering so that you can filter by all result columns.
Added the ability to export Attack Surface Discovery scan results.
Changed Functionality and Performance Enhancements:
The following enhancements are included in Nessus 10.5.0:
Improved CA read performance over TLS.
Improved Nessus global DB backup performance.
Added Terrascan.db to the nessuscli backup command.
Security Updates:
The following are security updates included in Nessus 10.5.0:
Updated spin.js to 2.3.2.
Updated datatables.net to 1.13.2.
Updated OpenSSL to 3.0.8.
Bug Fixes:
Updated Nessus to send socket timeouts when the send operation is in the SSL_WANT_READ state.
Reduced Nessus memory use when parsing hostnames.
Fixed a bug that generated the API disabled message.
Added Kanji font support in PDF reports.
Prevented configuration of the default cluster group while plugins are compiling.
Modified the behavior of payload handling to return a 400 error if a payload is not complete.
Modified Nessus to load activation workflow scripts locally to prevent plugin 119811 from flagging tenable.com.
Nessus now backs up default files when you perform a full reset of Nessus.Fixed a PDF page break issue.
Added the build number to the available Nessus Agent upgrade listing.
Supported Platforms:
Added support for the following operating systems:
Rocky Linux 9 (x86_64 and AArch64)
Alma Linux 9 (x86_64 and AArch64)
Redhat 9 (x86_64 and AArch64)
Debian 11 (i386 and AMD64)
Removed support for the following operating systems:
FreeBSD 11 and earlier
Ubuntu 13.10 and earlier
SUSE 11 and earlier
Debian 9 and earlier
Oracle Linux 6 and earlier
CentOS 6 and earlier
Kali 2019 and earlier
Windows 8 and earlier
Windows Server 2008 R2 and earlier
Changed Functionality and Performance Enhancements:
The following are changed functionality and performance enhancements included in Nessus 8.15.8:
Removed the ability to specify a Java executable path from the Nessus user interface to prevent undesired changes. Administrators can now specify a Java executable path with a nessuscli command: nessuscli fix --set path_to_java (for more information, see Fix Commands).
Fixed an issue that prevented users from using the Tenable migration tool to migrate Nessus 10.4.x licensed scanners to Tenable.io.
Security Updates:
The following are security updates included in Nessus 8.15.8:
Fixed a local privilege escalation vulnerability.
https://www.tenable.com/products/nessus/nessus-professional
(https://i.postimg.cc/kM6bQ5Yy/Nessus.png)
Attack Surface Analyzer is developed by the Microsoft Security Engineering Center (MSEC). It is the same tool used by Microsoft's internal product groups to catalog changes made to the operating system attack surface by installing new software.
MIT License
Whats new:>>
Add Ability to specify port for Gui command (#693)
https://github.com/microsoft/AttackSurfaceAnalyzer
Changelog
Tenable Vulnerability Management FedRAMP environments support Tenable Nessus scanners version 8.x and 10.4.0 and later.
(Automatic upgrades only) If you upgrade Tenable Nessus to a version later than 10.5.0, the Tenable Nessus will first upgrade to 10.5.0 before it upgrades to the desired version.
You can upgrade to the latest version of Tenable Nessus from any previously supported version.
If your upgrade path skips versions of Tenable Nessus, Tenable recommends reviewing the release notes for all skipped versions to learn about new features and bug fixes.
If you want your scanners to update to the newest version before the GA date automatically, set your Tenable Nessus Update Plan to Opt in to Early Access releases.
If you want to update your scanners to the latest version before the GA date manually, disable automatic updates so the scanner does not automatically downgrade to the previous version.
https://www.tenable.com/products/nessus/nessus-professional