All language subtitles for 4. Discovering Vulnerabilities With Nessus

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,020 --> 00:00:06,610 OK, that was loading for over an hour, but it is finally over. 2 00:00:06,660 --> 00:00:14,250 So we are ready to explore the necesito it is pretty simple to use your page should be blank since you 3 00:00:14,250 --> 00:00:15,990 haven't performed any scan yet. 4 00:00:16,620 --> 00:00:20,880 So we can click right here on this X button just to see better this page. 5 00:00:21,330 --> 00:00:24,900 And all you want to do from here is go to the new scan button. 6 00:00:26,210 --> 00:00:33,020 Right here, we will see all of the available options that we can do for our scans, so we got basic 7 00:00:33,020 --> 00:00:37,380 network scan, as it says, a full system scan suitable for any host. 8 00:00:38,000 --> 00:00:44,600 We got the advance scan, configure a scan without using any recommendations, and we got a bunch of 9 00:00:44,600 --> 00:00:45,500 the other options. 10 00:00:45,720 --> 00:00:51,860 And for some of them, we need the less professional version in order to use, such as this one, this 11 00:00:51,860 --> 00:00:55,920 one, this one, and all of these that have the upgrade on them. 12 00:00:56,590 --> 00:00:59,540 Now, it's already talked about witness centrals. 13 00:00:59,780 --> 00:01:04,640 We're only going to be able to scan local IP addresses inside of a company. 14 00:01:04,790 --> 00:01:08,460 You could use this tool to scan their networks for vulnerabilities. 15 00:01:09,290 --> 00:01:17,150 However, you cannot scan an external IP address with this scanning a website is not going to work unless 16 00:01:17,150 --> 00:01:18,430 it's inside of your network. 17 00:01:19,330 --> 00:01:26,380 Another thing to remind you is that we can scan with the free version up to 16 IP addresses, and if 18 00:01:26,380 --> 00:01:30,620 I'm not mistaken, those 16 IP addresses clean after 90 days. 19 00:01:30,640 --> 00:01:35,790 So after 90 days, you will be able to scan more IP addresses, but I'm not sure about that. 20 00:01:36,370 --> 00:01:41,920 And if you have a free version and you have more than 16 targets, you will have to scan that network 21 00:01:41,920 --> 00:01:43,680 with multiple Nessa's scans. 22 00:01:44,230 --> 00:01:51,310 So scanning big enterprise networks for big companies will require NASA's professional version. 23 00:01:51,830 --> 00:01:58,300 But what we want to do here to learn Nessus and how to use it, we want to go on to the basic networks 24 00:01:58,300 --> 00:01:58,600 can. 25 00:01:59,630 --> 00:02:06,830 And this basic scan will require us to specify some options now for our first scan will be scanning 26 00:02:06,980 --> 00:02:07,550 only. 27 00:02:08,840 --> 00:02:10,640 So turn it on. 28 00:02:10,670 --> 00:02:14,610 If you haven't already, check out the iPad to submit depletable. 29 00:02:14,630 --> 00:02:17,660 In my case, it is 190 to date, 168 at one point for. 30 00:02:18,750 --> 00:02:25,200 And once you do that, we can proceed to specify our options in the general tab under the name, you 31 00:02:25,200 --> 00:02:26,760 could specify anything you want. 32 00:02:26,790 --> 00:02:31,110 I will simply just type method exploitable under the description. 33 00:02:31,140 --> 00:02:32,590 I will just leave this empty. 34 00:02:32,610 --> 00:02:34,310 There is nothing really to specify here. 35 00:02:34,650 --> 00:02:36,360 You can put anything you want here. 36 00:02:36,360 --> 00:02:42,260 Just you can recognize which type of scan you did and on which target you did it in the folder. 37 00:02:42,390 --> 00:02:48,900 We will leave it on my scans and in the targets we specify the IP address of our target machine, since 38 00:02:48,900 --> 00:02:50,760 right now we are only scanning one machine. 39 00:02:50,970 --> 00:02:53,490 We will specify the IP address of metal plate. 40 00:02:54,090 --> 00:02:57,870 But if you were to scan on network, you would specify something like this. 41 00:02:58,140 --> 00:03:03,990 Wanted to do that 168 at one point one twenty four in case it is a 24 network. 42 00:03:04,170 --> 00:03:06,720 I believe you can also specified like this. 43 00:03:06,720 --> 00:03:10,440 So want to add to the 168 that one dot two fifty five. 44 00:03:11,010 --> 00:03:17,490 But right now let us just go with our metal plate and with the free version we can even scan two hundred 45 00:03:17,490 --> 00:03:18,570 and fifty five hosts. 46 00:03:18,990 --> 00:03:21,000 Remember we can only scan 16. 47 00:03:22,050 --> 00:03:27,840 Once you specify this, we want to proceed to the schedule tab and here this schedule tab is useful 48 00:03:27,840 --> 00:03:32,760 once you want to schedule their scans on a certain period of time or you just want to schedule a scan 49 00:03:32,760 --> 00:03:35,050 while you're doing something else on the site. 50 00:03:35,610 --> 00:03:39,110 For now, we're going to leave it off under the notifications. 51 00:03:39,240 --> 00:03:43,570 You can choose if you want to send results to some emails over SMTP server. 52 00:03:44,110 --> 00:03:47,890 We are not going to be doing that right now in the Discovery tab. 53 00:03:47,940 --> 00:03:49,320 This is the important stuff. 54 00:03:50,240 --> 00:03:57,560 Here we choose how many and which ports we want to scan, we have an option of scanning common ports 55 00:03:58,250 --> 00:04:00,990 and this is similar to a map default ports. 56 00:04:01,760 --> 00:04:09,200 It will only scan most popular ports or you can select scan all ports, which we are going to use right 57 00:04:09,200 --> 00:04:12,650 now to scan all sixty five thousand ports, no exploitable. 58 00:04:13,040 --> 00:04:16,940 And if you want, there is a custom option, which is the third option right here. 59 00:04:17,150 --> 00:04:21,020 But we are pretty satisfied with this scan all ports option. 60 00:04:21,470 --> 00:04:27,230 If you read the settings, the general settings always tells the Nexus localhost use Fastnet for discovery 61 00:04:27,230 --> 00:04:28,790 and of the ports or settings. 62 00:04:28,790 --> 00:04:35,210 We have scanned all ports usenet's that if credentials are provided use since scanner if necessary, 63 00:04:35,810 --> 00:04:40,340 and we're pinging hosts using TCP, AAFP and ICMP. 64 00:04:41,270 --> 00:04:41,600 Good. 65 00:04:42,410 --> 00:04:49,280 Once you set this to scan all ports, you can go to the assessment and in the assessment tab we can 66 00:04:49,280 --> 00:04:50,900 choose what we want to scan for. 67 00:04:51,530 --> 00:04:53,180 So there are a few options. 68 00:04:53,210 --> 00:04:59,390 If I click right here on this can type, we have scanned for known web vulnerabilities, scan for all 69 00:04:59,390 --> 00:05:03,590 web and abilities and scan for all Verbruggen abilities complex. 70 00:05:04,010 --> 00:05:08,620 For the purposes of this tutorial, we will be scanning for known Web vulnerabilities. 71 00:05:08,840 --> 00:05:09,250 Why? 72 00:05:09,530 --> 00:05:12,290 Well, this will just take lesser time to finish. 73 00:05:12,890 --> 00:05:18,560 When you run scan for complex web vulnerabilities, it usually takes a lot more time and we can see 74 00:05:18,560 --> 00:05:25,460 right here and the general settings avoid potential false alarms enabled by scanning and web applications. 75 00:05:25,790 --> 00:05:31,970 We will crawl up to one thousand pages, up to six directories, and we will test for known vulnerabilities 76 00:05:31,970 --> 00:05:33,830 in commonly used Web applications. 77 00:05:34,040 --> 00:05:36,500 These are our assessment settings. 78 00:05:37,460 --> 00:05:42,650 But also, keep in mind that if we discover some vulnerabilities, we will see how to attack them in 79 00:05:42,650 --> 00:05:46,700 the Web penetration testing section that will come right after the exploitation section. 80 00:05:47,150 --> 00:05:53,900 For now, let us just see whether Nessus will find something juicy right after we go to the report settings. 81 00:05:54,410 --> 00:05:56,570 And usually you want to leave this on default. 82 00:05:56,580 --> 00:05:58,970 So we are not going to be changing anything right here. 83 00:05:59,300 --> 00:06:05,210 And finally, in the advanced that we will leave it on default for now and proceed to click on Save. 84 00:06:05,540 --> 00:06:07,550 So click on Save right here. 85 00:06:08,980 --> 00:06:10,810 And you should have your skin right here. 86 00:06:11,840 --> 00:06:19,100 Now you will notice that it does not automatically start, we must launch it and we do that by clicking 87 00:06:19,100 --> 00:06:22,970 on this arrow right here, which says launch, click on it. 88 00:06:25,550 --> 00:06:31,820 In just a few seconds, here it is, these green arrows will start spinning and our skin has officially 89 00:06:31,820 --> 00:06:32,300 started. 90 00:06:33,170 --> 00:06:37,940 This will try to discover all the vulnerabilities it can find for the political machine. 91 00:06:38,990 --> 00:06:43,480 Now, keep in mind that these scans can take a lot longer then and map scans. 92 00:06:43,730 --> 00:06:49,940 You can always check the current status scan by clicking on the scan name, in our case on the anticipatable. 93 00:06:51,590 --> 00:06:57,980 And you will be able to see what it managed to find for now during the scan, different vulnerabilities 94 00:06:58,220 --> 00:07:00,140 will be marked with different colors. 95 00:07:00,890 --> 00:07:04,310 We will have blue color, which means information, disclosure. 96 00:07:04,940 --> 00:07:10,670 And what that is, is it possibly managed to find some information that should be private or it managed 97 00:07:10,670 --> 00:07:16,010 to find the service version or something similar that allows us to find out more information about the 98 00:07:16,010 --> 00:07:16,490 target? 99 00:07:16,640 --> 00:07:19,610 It doesn't necessarily mean that the information is useful, though. 100 00:07:20,150 --> 00:07:26,500 Then we have green, yellow and orange vulnerabilities or also known as low, medium and high vulnerabilities. 101 00:07:26,750 --> 00:07:32,450 And at the end we get the most interesting vulnerabilities which are critical vulnerabilities. 102 00:07:33,610 --> 00:07:37,270 This usually includes remote code execution or something similar. 103 00:07:38,440 --> 00:07:44,170 So what you can also do, you can click on them, and this is just what it managed to find at this current 104 00:07:44,170 --> 00:07:45,420 point of scan. 105 00:07:46,240 --> 00:07:48,780 So we got one critical vulnerability for now. 106 00:07:49,210 --> 00:07:55,450 We got to mix vulnerabilities, one medium vulnerability and some information disclosure right here. 107 00:07:56,610 --> 00:08:02,040 Let's go back and we're going to wait for this to finish, and once it's done, we will get back to 108 00:08:02,040 --> 00:08:03,210 it and see the results. 109 00:08:03,750 --> 00:08:04,590 All right. 110 00:08:04,830 --> 00:08:06,630 It is finally over. 111 00:08:06,930 --> 00:08:14,040 And we can see if I click on the scan that it managed to discover a bunch of vulnerabilities, all kinds 112 00:08:14,040 --> 00:08:14,310 of them. 113 00:08:15,000 --> 00:08:18,540 Let us go through these results and see some of the vulnerabilities it found. 114 00:08:19,260 --> 00:08:23,360 Remember, we are most interested in critical and high vulnerabilities. 115 00:08:24,060 --> 00:08:27,740 Others can also be useful, but these two are the main ones. 116 00:08:28,290 --> 00:08:34,070 First thing we see is that it managed to find seven critical motability, 11 vulnerabilities. 117 00:08:34,560 --> 00:08:41,790 Thirty six medium vulnerabilities, seven low and one hundred and forty eight information disclosure. 118 00:08:42,660 --> 00:08:43,980 Let us click on the scan. 119 00:08:44,980 --> 00:08:51,190 Right here, we can order the vulnerabilities by their severity, so if I click on this arrow, it will 120 00:08:51,190 --> 00:08:55,940 go from the information to the critical, but mostly we are interested in critical vulnerabilities. 121 00:08:55,950 --> 00:08:59,410 So click it once again and let's go with any one of them. 122 00:08:59,630 --> 00:09:02,290 We're going to see an example of each vulnerability. 123 00:09:02,320 --> 00:09:08,350 We're going to check one critical, one high, one medium, one low and one information disclosure. 124 00:09:08,650 --> 00:09:11,200 Let's go, for example, with this one. 125 00:09:12,230 --> 00:09:19,460 So it says Neff's exported share information, disclosure, this is a critical vulnerability down here, 126 00:09:19,460 --> 00:09:24,950 we can see the description and it says at least one of the NAFS shares exported by the remote server 127 00:09:25,310 --> 00:09:31,420 could be mounted by the scanning host and attacker may be able to leverage this to read and possibly 128 00:09:31,420 --> 00:09:33,020 Vereide files on remote host. 129 00:09:33,590 --> 00:09:38,450 He tells us what is the solution to fix this vulnerability, as it says Conficker nafs on the remote 130 00:09:38,450 --> 00:09:42,260 coast so that only authorized hosts can mount its remote shares. 131 00:09:43,160 --> 00:09:43,760 Down here. 132 00:09:43,760 --> 00:09:46,070 It tells us where it found the vulnerability. 133 00:09:46,370 --> 00:09:51,740 It found it on our display table on the two thousand forty nine UDP port. 134 00:09:52,580 --> 00:09:57,560 And what you would do, for example, is you would then Google this vulnerability, which we learned 135 00:09:57,560 --> 00:10:02,330 in the previous video, were recovered Googling vulnerabilities and search it and you would see how 136 00:10:02,330 --> 00:10:03,200 you would exploit this. 137 00:10:03,380 --> 00:10:05,760 For now, we know that this exists. 138 00:10:06,260 --> 00:10:08,330 Let's check another critical vulnerability. 139 00:10:08,930 --> 00:10:13,580 Let's go, for example, onto this one, bandshell, factor detection. 140 00:10:15,270 --> 00:10:20,910 It says a shell is listing on the remote port without any notification being required, an attacker 141 00:10:20,910 --> 00:10:24,700 may use it by connecting to the remote port and sending commands directly. 142 00:10:25,210 --> 00:10:25,590 Hmm. 143 00:10:26,130 --> 00:10:28,070 This seems like a really big problem. 144 00:10:28,650 --> 00:10:33,910 And we're going to see in the next section how we can actually gain access from this critical vulnerability. 145 00:10:34,500 --> 00:10:36,780 It is very, very easy, trust me. 146 00:10:37,260 --> 00:10:41,310 But these types of misconfiguration happen often down here. 147 00:10:41,310 --> 00:10:46,970 We can see the solution, verify the remote coast has been compromised and reinstall the system if necessary. 148 00:10:47,400 --> 00:10:53,450 And the actual motability is found on the port one five to four over Tsipi. 149 00:10:54,330 --> 00:10:57,360 Now, since critical vulnerabilities are most important. 150 00:10:57,390 --> 00:10:58,650 Let us check another one. 151 00:10:59,580 --> 00:11:03,600 Let's go on to this one free and see server password is password. 152 00:11:03,940 --> 00:11:09,150 So it seems that we get the default credentials for some software running on our anticipatable. 153 00:11:09,420 --> 00:11:14,250 As it says, the server running on the remote coast is secured with a weak password. 154 00:11:14,520 --> 00:11:18,510 And this type of vulnerability is something that you will find the most. 155 00:11:19,020 --> 00:11:24,810 Now, it doesn't have to be anything connected to the BNC server, but weak credentials are something 156 00:11:24,810 --> 00:11:26,850 that even the biggest companies have. 157 00:11:27,360 --> 00:11:29,670 And you can have all the security in the world. 158 00:11:29,670 --> 00:11:32,830 But if your password is weak, none of that security will matter. 159 00:11:33,510 --> 00:11:37,290 Down here, we see the Nessus logged in using a password password. 160 00:11:37,620 --> 00:11:38,940 And what was it on? 161 00:11:39,090 --> 00:11:46,380 It was port five thousand and nine hundred over TSIPI So we will see how we can exploit all of this. 162 00:11:46,650 --> 00:11:49,380 But let us also check out some other vulnerabilities as well. 163 00:11:50,340 --> 00:11:53,700 Pache, Tomcat, HP, Connecter, request injection. 164 00:11:54,180 --> 00:11:54,990 Let's click on it. 165 00:11:55,140 --> 00:12:00,330 This seems to be a high vulnerability and it tells us a fault for inclusion. 166 00:12:00,330 --> 00:12:02,580 Motability was found in HP Connecter. 167 00:12:02,850 --> 00:12:08,790 Our remote unauthenticated attacker could exploit this vulnerability to read Web application files from 168 00:12:08,790 --> 00:12:10,070 a vulnerable server. 169 00:12:10,620 --> 00:12:15,330 It tells us that the solution is to actually upgrade Tomcat server to the newer version. 170 00:12:16,020 --> 00:12:21,810 And down here it tells us over which port did it find a vulnerability, which is Port 29. 171 00:12:22,770 --> 00:12:27,960 On the right side, we can also see some additional vulnerability information, such as what is the 172 00:12:27,960 --> 00:12:28,770 vulnerability for? 173 00:12:28,770 --> 00:12:29,940 It is for Apache attack. 174 00:12:29,940 --> 00:12:32,010 It is the exploit available. 175 00:12:32,040 --> 00:12:35,160 Yes, the exploit exists for this and they are available. 176 00:12:35,580 --> 00:12:42,540 The patch was published on March 1st, 2020, and vulnerability was also published on that same day. 177 00:12:42,750 --> 00:12:49,290 And Nessus managed to successfully exploit it, reference information and here the vulnerability names. 178 00:12:50,100 --> 00:12:54,910 She would just type this search for an exploit for it and you would manage to exploit them at this point, 179 00:12:54,920 --> 00:12:55,500 the machine. 180 00:12:56,430 --> 00:13:01,110 Let's check out a few more vulnerabilities and then we are going to wrap up with this tutorial. 181 00:13:01,110 --> 00:13:06,870 Let's go to a medium one and let's go, for example, to this one. 182 00:13:06,870 --> 00:13:09,000 SMB signing not required. 183 00:13:09,450 --> 00:13:13,990 Signing is not required under both SMB server and authenticated remote. 184 00:13:13,990 --> 00:13:19,110 Tacker can exploit this to conduct man in the middle attacks against the SMB server. 185 00:13:19,920 --> 00:13:26,010 Now we have not covered many in the middle yet, but later in the course we will be devoting an entire 186 00:13:26,010 --> 00:13:29,910 section to this attack to the man in the middle attack. 187 00:13:30,420 --> 00:13:36,990 So for now, we just know that the S&P support, which is running on Port four for five, is vulnerable 188 00:13:36,990 --> 00:13:38,490 to the man in the middle attacks. 189 00:13:39,540 --> 00:13:43,560 OK, let us also check out some information disclosure. 190 00:13:44,340 --> 00:13:51,000 So right here we can open a cell detection service detection, get request SSL DL's version supported 191 00:13:51,210 --> 00:13:54,900 so we can check out which SSL and versions are supported. 192 00:13:55,440 --> 00:14:00,270 This plug into text, which are some Thaler's versions, are supported by the Remote Service for Encrypting 193 00:14:00,270 --> 00:14:07,080 Communications, and this port seems to be running SSL version two as Salvacion three and version one. 194 00:14:07,320 --> 00:14:12,750 And these are just different protocols used for encryption of the data that is being transferred over 195 00:14:12,750 --> 00:14:13,350 this port. 196 00:14:13,980 --> 00:14:18,900 And once again, you will see that SSL is vulnerable to the man in the middle attack. 197 00:14:18,900 --> 00:14:22,080 We can decrypt this data using that specific attack. 198 00:14:23,020 --> 00:14:27,460 However, don't worry, if you fully don't understand what I'm talking about, this is once again something 199 00:14:27,460 --> 00:14:29,140 that we will cover in a later section. 200 00:14:29,650 --> 00:14:30,430 OK, great. 201 00:14:31,390 --> 00:14:34,810 Do you see right now how amazing this NSA scandal is? 202 00:14:35,790 --> 00:14:40,890 It literally gave us most of the vulnerabilities just from a single scan in the next section. 203 00:14:40,920 --> 00:14:46,140 We will see how to exploit most of these vulnerabilities on them at this point, but on other targets 204 00:14:46,140 --> 00:14:46,500 as well. 205 00:14:47,350 --> 00:14:53,370 In the next video, we're going to scan other machine using Nessus and we're going to see what results 206 00:14:53,370 --> 00:14:55,170 we get see in the next. 21600

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.