Best FREE Vulnerability Scanner: Nessus Vs OpenVAS (Greenbone)

  Рет қаралды 28,849

Pro Tech Show

Pro Tech Show

Күн бұрын

Hackers are experts at finding gaps in your security, but what if you could find them first? This is what vulnerability scanners do. They automatically scan your devices and find the weaknesses that hackers might try to exploit.
Two of the most well-respected vulnerability scanners are Tenable's Nessus and OpenVAS aka Greenbone Vulnerability Management. Both of them have free versions, but which is the best?
💬 Follow Me
/ andrewmrquinn
🌐 Nessus Essentials
www.tenable.com/products/ness...
🌐 Greenbone Enterprise Trial (OpenVAS)
www.greenbone.net/en/testnow/
Kali Linux (for Greenbone Source/Community Edition)
www.kali.org
Video timestamps:
0:00 - Vulnerability Scanners, Patch Scanners, and Penetration Tests
2:06 - Tenable Nessus, Greenbone OpenVAS, and Competitors
3:05 - Free Version Limitations
6:29 - User Experience Comparison
7:26 - Detecting Vulnerabilites in Unsupported Software
9:53 - Detecting Insecure Configurations: Test Setup
14:17 - Detecting Insecure Configurations: Results
18:54 - Conclusion
#CyberSecurity #Nessus #OpenVAS #Greenbone #VulnerabilityScanner

Пікірлер: 29
@Nikoolayy1
@Nikoolayy1 10 ай бұрын
Well Nessus can also do Web Application Tests and OpenVAS is just a vunrability scanner, so we have to add that into the picture as Nessus even can log into the web app using web form or basic authentication. I am not saying that OpenVAS is bad but it depends if you just need a vunrability scanner or also to test a web application.
@r3dl3ad3r
@r3dl3ad3r 8 ай бұрын
Deeper dive into a framework that can help less experienced individuals understand findings -Your review in plain language really helped understand me understand some common detections
@ProTechShow
@ProTechShow 8 ай бұрын
Interesting idea. I'm not aware of a framework for such a thing, other than experience. As a crude tool the CVSS score can be used to roughly gauge how much you need to worry about a particular vulnerability, but it doesn't do much to really explain them.
@john.walley
@john.walley Ай бұрын
Excellent overview. Thank you for such an in-depth review.
@ProTechShow
@ProTechShow Ай бұрын
Thanks!
@VideoGigs
@VideoGigs 11 ай бұрын
Great video! Many thanks for making it. I especially appreciated that you included info on false positives and gave a brief description on some of the findings. Just wondering if you know of any good resource online that breaks down the Nessus scan finding better than what is provided by Nessus. Basically a better description of the configuration-type issues found and remediation advice etc?
@ProTechShow
@ProTechShow 11 ай бұрын
Thanks! I'm not aware of a generic location for information on everything. The best bet is to look on the website of the affected vendor. If there's a CVE number, stick that into Google. Microsoft, Red Hat, etc. will usually have a page dedicated to CVE that affects their products which will go into more detail. For others, stick the key phrase into Google and look for hits from the related vendor. These can be more work to find but there's usually an article about it somewhere - even if it's just to refute the alleged vulnerability.
@ffe4org
@ffe4org 11 ай бұрын
I'm curious about your scan approach. I don't have Nessus, but with GVM/openvas, you have two scan approaches: Outside scan, Internal System scan. The outside scan, meaning being outside the host and scanning for vulnerabilities and the Internal System scan being one where you setup a Root user, pass the access to GVM and it logs in to the system to find libraries installed and their current vulnerability status (any CVE's listed on them.) From the penetration tester/red team point of view, you're taking on the role of an outsider, seeing what's open, what's broadcasting, etc. From a Blue Team perspective, you probably want to know what libraries are out of date, what CVEs are reported for what is running and installed on the system. A scan of the system, as root, is preferable to finding these issues. In GVM setting up that Root scan is not simple and isn't the default, but when done it is the most powerful aspect of GVM (imo).
@ProTechShow
@ProTechShow 11 ай бұрын
Nessus has the same options to run with or without credentials to log in to target systems. All of the scans used for this video were authenticated scans from the local network (blue team scenario) to give both tools the best opportunity to find problems.
@ffe4org
@ffe4org 11 ай бұрын
@@ProTechShow I actually downloaded Nessus Essentials and it looks like all the scans require an access token. It's kinda a pain, or do I have it wrong? Like in BurpSuite I don't need to pass in a user login, it can run against a web app pre login, or post login using my session. But in Nessus Essentials web app scan it seems like I need to give it a user/pass and know the param pattern for passing it to the backend. I like that level when scanning libraries on a system, but for pentesting vuln scanning I can't seem to get Nessus to just scan without giving it user credentials.
@ProTechShow
@ProTechShow 11 ай бұрын
@@ffe4org if you start with the "advanced scan" template it's more of a GVM-like network scan. You can add credentials, but you don't have to. That's the method I used for the video.
@zootsuitpenguin
@zootsuitpenguin Ай бұрын
This is great info! Thanks sir!!!
@ProTechShow
@ProTechShow Ай бұрын
Glad it was useful
@nshettys
@nshettys 3 ай бұрын
Great Stuff!!!
@ProTechShow
@ProTechShow 3 ай бұрын
Thanks 🙂
@ruipereira-ci6hm
@ruipereira-ci6hm 10 ай бұрын
Where can I find the video mentioned at 19:29?
@ProTechShow
@ProTechShow 10 ай бұрын
It should pop up on the end screen, but in case it's not supported on your device the direct link is kzfaq.info/get/bejne/mpxno8eXrKjdo30.html
@aprendainformaticagratis
@aprendainformaticagratis 3 ай бұрын
How about the docker version? " mikesplain/openvas "
@ProTechShow
@ProTechShow 3 ай бұрын
Don't use it. That container image isn't maintained and has a version of OpenVAS that went end-of-life many years ago. There are official container images from Greenbone, but I don't personally use them. It seems like an overcomplication to me (it uses 16 containers), but if you want to go the Docker route that's the way to get a supported version.
@50PullUps
@50PullUps 11 ай бұрын
We used InsightVM by Rapid7.
@ProTechShow
@ProTechShow 11 ай бұрын
One of the few that I believe is not based on Nessus/OpenVAS. I've not used it but heard good things. I think Rapid7 stopped offering a free version, though?
@leek4994
@leek4994 11 ай бұрын
I wonder how Wazuh would do in this scenario. It might be a little overkill though.
@ProTechShow
@ProTechShow 11 ай бұрын
My experience of Wazuh's vulnerability scanning is that it produces very poor quality results. The vulnerability module is more of a patch scanner in that it's just comparing installed software to a list of CVEs, so you can apply what I said at the start of the video. Combining its vulnerability results with its SCA module does go some way to providing better coverage by including quite a few configuration issues, but even so I've found the vulnerability module produces a LOT of false positives. If it was more accurate the agent-based approach would be great for mobile devices like laptops that are difficult to target with a network-based scan; but unfortunately I've found that the majority of its detections to be incorrect. I do quite like the Wazuh project, but the vulnerability results don't cut it for me at present.
@xelerated
@xelerated 4 ай бұрын
The reason Nessus is still ahead is the greenbone ui is so freaking ugly and not at all intuitive. Change that horrible ui and you might make great strides
@ProTechShow
@ProTechShow 4 ай бұрын
It is in dire need of a UX update, that's for sure
@burklafaburklafa6006
@burklafaburklafa6006 7 ай бұрын
0,75 is OK for non-natives
@user-te1mq9te1i
@user-te1mq9te1i 2 ай бұрын
NESSUS FROM GD
@zeprii9548
@zeprii9548 4 күн бұрын
Lol both of these are paid not, and none of them have a free version
@ProTechShow
@ProTechShow 4 күн бұрын
The video literally shows the free editions of both of them, and they're linked in the description
this Cybersecurity Platform is FREE
39:46
John Hammond
Рет қаралды 523 М.
Install Nessus for Free and scan for Vulnerabilities (New Way)
14:56
¡Puaj! No comas piruleta sucia, usa un gadget 😱 #herramienta
00:30
JOON Spanish
Рет қаралды 22 МЛН
1 класс vs 11 класс (неаккуратность)
01:00
БЕРТ
Рет қаралды 4,5 МЛН
顔面水槽をカラフルにしたらキモ過ぎたwwwww
00:59
はじめしゃちょー(hajime)
Рет қаралды 36 МЛН
Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)
13:06
60 Hacking Commands You NEED to Know
27:01
NetworkChuck
Рет қаралды 356 М.
Über Greenbone
2:26
Greenbone AG
Рет қаралды 1,3 М.
How to not get hacked: real example
13:55
The PC Security Channel
Рет қаралды 379 М.
This Protects Me from Ransomware
14:33
Pro Tech Show
Рет қаралды 1,2 М.
EDR, MDR & XDR Explained
10:33
Pro Tech Show
Рет қаралды 25 М.
How to Configure Nessus Vulnerability Scanner
13:38
MrTurvey
Рет қаралды 19 М.
Vulnerability Scanning using OpenVas
16:07
Cyber Security Ranger
Рет қаралды 9 М.
👎Главный МИНУС планшета Apple🍏
0:29
Demin's Lounge
Рет қаралды 489 М.
wyłącznik
0:50
Panele Fotowoltaiczne
Рет қаралды 22 МЛН
Теперь это его телефон
0:21
Хорошие Новости
Рет қаралды 1,7 МЛН
МОЖНО ЛИ заряжать AirPods в чехле 🧐😱🧐 #airpods #applewatch #dyson
0:22
Apple_calls РЕПЛИКА №1 В РФ
Рет қаралды 20 М.
Huawei который почти как iPhone
0:53
Romancev768
Рет қаралды 493 М.