Nessus Reporting Karma

Null Meet Pune May 2011 Pune, India
1 / 32
Slide 1 of Nessus Reporting Karma
Slide 2 of Nessus Reporting Karma
Slide 3 of Nessus Reporting Karma
Slide 4 of Nessus Reporting Karma
Slide 5 of Nessus Reporting Karma
Slide 6 of Nessus Reporting Karma
Slide 7 of Nessus Reporting Karma
Slide 8 of Nessus Reporting Karma
Slide 9 of Nessus Reporting Karma
Slide 10 of Nessus Reporting Karma
Slide 11 of Nessus Reporting Karma
Slide 12 of Nessus Reporting Karma
Slide 13 of Nessus Reporting Karma
Slide 14 of Nessus Reporting Karma
Slide 15 of Nessus Reporting Karma
Slide 16 of Nessus Reporting Karma
Slide 17 of Nessus Reporting Karma
Slide 18 of Nessus Reporting Karma
Slide 19 of Nessus Reporting Karma
Slide 20 of Nessus Reporting Karma
Slide 21 of Nessus Reporting Karma
Slide 22 of Nessus Reporting Karma
Slide 23 of Nessus Reporting Karma
Slide 24 of Nessus Reporting Karma
Slide 25 of Nessus Reporting Karma
Slide 26 of Nessus Reporting Karma
Slide 27 of Nessus Reporting Karma
Slide 28 of Nessus Reporting Karma
Slide 29 of Nessus Reporting Karma
Slide 30 of Nessus Reporting Karma
Slide 31 of Nessus Reporting Karma
Slide 32 of Nessus Reporting Karma

Abstract

Covers Nessus vulnerability scanner reporting formats, custom report parsing techniques, and building an integrated vulnerability management system with a PHP and Oracle backend.

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This interactive session covers Nessus vulnerability scanner reporting formats, custom report parsing, and building an integrated vulnerability management system with PHP and Oracle database backend.

Key Topics Covered

Nessus Reporting Formats:

  • HTML: Standard web-based reports
  • NBE: Legacy format
  • .nessus v1: Three sections (Target, Policies, Reports) with data fields combined in a single section
  • .nessus v2: Improved format with clearly separated fields (CVSS vector, plugin output in separate tags), documented at Tenable’s specification

Format Evolution:

  • The v2 format continuously evolves with new tags
  • Recent additions include exploit_available, exploit_framework_canvas, canvas_package, exploit_framework_metasploit, and metasploit_name
  • These fields enable automated correlation with exploitation frameworks

Custom Parsing Approaches:

  • Existing options include Seccubus (periodic scan with report comparison) and various Python/Perl tools
  • Custom parsing needed for: integrating with existing infrastructure tools, deeper customization, and better control over scan frequency and granularity
  • Demonstrated a PHP proof-of-concept parser using simplexml_load_file to extract all report fields

Integrated Vulnerability Management System:

  • PHP frontend for uploading reports to Oracle database
  • Integration with inventory management tools
  • Key analysis features:
    • Known false positive identification by plugin ID
    • Vulnerability grouping by common remediation
    • Classification by network vs. server devices
    • Excel-based report extraction
    • Cross-referencing with system inventory to find missing systems
    • Tracking repeated vulnerabilities over time using system inventory IDs
    • Detecting changes in device details between scan snapshots

Plugin Detail Extraction:

  • Nessus 4.2 and below: command-line query interface
  • Above 4.2: XML-RPC interface for remote initialization and control

Planned Enhancements:

  • Creating similar interface for OpenVAS
  • Using XML-RPC for remote initialization and control
  • Adding MySQL as an alternative database option

Actionable Takeaways

  1. Understanding Nessus XML formats enables powerful custom reporting
  2. Integrating vulnerability data with asset inventory provides organizational context
  3. Automated false positive identification by plugin ID reduces analysis burden
  4. Grouping vulnerabilities by common remediation streamlines patching efforts
  5. Historical tracking reveals vulnerability trends and persistent issues

Embed This Presentation

See Also

vulnerability_management