{"id":106,"date":"2024-06-02T02:14:13","date_gmt":"2024-06-02T02:14:13","guid":{"rendered":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/"},"modified":"2024-06-02T02:14:13","modified_gmt":"2024-06-02T02:14:13","slug":"nessus-port-scanning-part-1","status":"publish","type":"post","link":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/","title":{"rendered":"Nessus Port Scanning (Part 1)"},"content":{"rendered":"<div class=\"toc\">\n<h2>Table of Contents<\/h2>\n<ul>\n<li><a href=\"#Introduction\">Introduction<\/a><\/li>\n<li><a href=\"#Understanding-Port-Scanners-in-Nessus\">Understanding Port Scanners in Nessus<\/a><\/li>\n<li><a href=\"#Analyzing-a-Recent-Scan\">Analyzing a Recent Scan<\/a><\/li>\n<li><a href=\"#Examining-the-Netstat-Portscanner-Plugin\">Examining the Netstat Portscanner Plugin<\/a>\n<ul>\n<li><a href=\"#Plugin-Description\">Plugin Description<\/a><\/li>\n<li><a href=\"#Plugin-Code\">Plugin Code<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#Port-Scanning-Without-Credentials\">Port Scanning Without Credentials<\/a><\/li>\n<li><a href=\"#Understanding-Other-Port-Scanner-Plugins\">Understanding Other Port Scanner Plugins<\/a><\/li>\n<li><a href=\"#Conclusion\">Conclusion<\/a><\/li>\n<\/ul>\n<\/div>\n<h2 id=\"Introduction\">Introduction<\/h2>\n<p>In this article, we will explore the port scanning capabilities of Nessus, a popular vulnerability scanning tool. We will delve into the different types of port scanners that Nessus uses, how to view and modify the settings, and whether it is simply an NMAP plugin. Let&#8217;s dive in and uncover the details.<\/p>\n<h2 id=\"Understanding-Port-Scanners-in-Nessus\">Understanding Port Scanners in Nessus<\/h2>\n<p>When running a Discovery Scan with Nessus, you may wonder how the tool gathers its port information. While the simple answer is &#8220;port scanning,&#8221; we need to understand the specific type of port scanning employed by Nessus. To begin our exploration, let&#8217;s visit the following link: <a href=\"https:\/\/anon.tools\/public\/blog\/nessus\/port-scanners\">https:\/\/anon.tools\/public\/blog\/nessus\/port-scanners<\/a>.<\/p>\n<h2 id=\"Analyzing-a-Recent-Scan\">Analyzing a Recent Scan<\/h2>\n<p>To gain a deeper understanding of Nessus&#8217; port scanning capabilities, let&#8217;s examine a recent scan and filter for the Port Scanner plugin family. Follow these steps:<\/p>\n<ol>\n<li>Open your browser and navigate to &#8220;Scans &gt; [Scan Name] &gt; Vulnerabilities.&#8221;<\/li>\n<li>Apply the &#8220;Portscanner&#8221; filter to display the relevant plugins.<\/li>\n<\/ol>\n<p>By filtering for the Portscanner family, we can see the specific plugin that Nessus utilized during the scan.<\/p>\n<h2 id=\"Examining-the-Netstat-Portscanner-Plugin\">Examining the Netstat Portscanner Plugin<\/h2>\n<p>One such plugin we may encounter is the Netstat Portscanner Plugin (ID 14272). Let&#8217;s explore what this plugin does and how it operates.<\/p>\n<h3 id=\"Plugin-Description\">Plugin Description<\/h3>\n<p>The plugin description reveals that it executes a netstat command using the provided SSH credentials. Although its type is listed as &#8220;Remote,&#8221; it utilizes the SSH credentials for port enumeration, rather than running an &#8220;ss&#8221; command.<\/p>\n<h3 id=\"Plugin-Code\">Plugin Code<\/h3>\n<p>We can even take a peek into the plugin code to understand its underlying functionality. The code snippet below demonstrates the netstat command being executed:<\/p>\n<p>&#8220;`python<br \/>\nif (lcx::check_localhost())<br \/>\n{<br \/>\n    buf = netstat::run_localhost_netstat();<\/p>\n<pre><code>if (buf)\n{\n    set_kb_item(name:\"Host\/netstat\", value:buf);\n    set_kb_item(name:\"Host\/netstat\/method\", value:\"local\");\n\n    if (agent())\n    {\n        agent_ip = agent_get_ip();\n\n        if (!isnull(agent_ip))\n            report_xml_tag(tag:\"host-ip\", value:agent_ip);\n    }\n}\nelse\n    exit(1, \"Failed to run the command 'netstat -a -n' on localhost.\");\n<\/code><\/pre>\n<p>}<br \/>\n&#8220;`<\/p>\n<p>Based on this code snippet, we can confirm that the plugin indeed uses the netstat -a -n command for port scanning. Note that netstat is available on both Windows and Linux systems.<\/p>\n<h2 id=\"Port-Scanning-Without-Credentials\">Port Scanning Without Credentials<\/h2>\n<p>To further investigate the behavior of Nessus&#8217; port scanning, let&#8217;s see what happens when we remove the SSH credentials. In this case, the scan completes successfully, but the Port Scanner plugin only attempts a ping. However, a ping alone cannot provide port information, as evident from the plugin&#8217;s output, which fails to detect any ports and simply confirms that the host is up.<\/p>\n<h2 id=\"Understanding-Other-Port-Scanner-Plugins\">Understanding Other Port Scanner Plugins<\/h2>\n<p>Now that we know where to find the plugin information, we can follow the same approach to explore other port scanner plugins used by Nessus. Visit <a href=\"https:\/\/anon.tools\/public\/blog\/nessus\/port-scanners\">https:\/\/anon.tools\/public\/blog\/nessus\/port-scanners<\/a> and run the scan while filtering for port scanner plugins. Check the plugin code and output to gain insights into how Nessus obtains its port information.<\/p>\n<h2 id=\"Conclusion\">Conclusion<\/h2>\n<p>In this part of the series, we have covered the basics of Nessus&#8217; port scanning capabilities. We have explored the Netstat Portscanner Plugin, its code, and the behavior when SSH credentials are absent. In the next part, we will delve into customizing port scans, defining port scan ranges, and troubleshooting steps. If you have any questions, please leave a comment below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Port scanner guide: Learn about Nessus port scanning in depth in this informative blog post. Understand how to optimize your security measures.<\/p>\n","protected":false},"author":1,"featured_media":107,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[69],"class_list":["post-106","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-port-scanning","tag-nessus-port-scanning-security-measures"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nessus Port Scanning (Part 1)<\/title>\n<meta name=\"description\" content=\"Port scanner guide: Learn about Nessus port scanning in depth in this informative blog post. Understand how to optimize your security measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nessus Port Scanning (Part 1)\" \/>\n<meta property=\"og:description\" content=\"Port scanner guide: Learn about Nessus port scanning in depth in this informative blog post. Understand how to optimize your security measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Anon Tools Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-02T02:14:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"942\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"wp_An0nBLoG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wp_An0nBLoG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/\"},\"author\":{\"name\":\"wp_An0nBLoG\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/#\/schema\/person\/c08bec5f31609e1ba68526ed2797c2a5\"},\"headline\":\"Nessus Port Scanning (Part 1)\",\"datePublished\":\"2024-06-02T02:14:13+00:00\",\"dateModified\":\"2024-06-02T02:14:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/\"},\"wordCount\":549,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp\",\"keywords\":[\"Nessus port scanning security measures\"],\"articleSection\":[\"Port Scanning\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/\",\"url\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/\",\"name\":\"Nessus Port Scanning (Part 1)\",\"isPartOf\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp\",\"datePublished\":\"2024-06-02T02:14:13+00:00\",\"dateModified\":\"2024-06-02T02:14:13+00:00\",\"description\":\"Port scanner guide: Learn about Nessus port scanning in depth in this informative blog post. Understand how to optimize your security measures.\",\"breadcrumb\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage\",\"url\":\"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp\",\"contentUrl\":\"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp\",\"width\":942,\"height\":628,\"caption\":\"port scanner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/anon.tools\/public\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nessus Port Scanning (Part 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/#website\",\"url\":\"https:\/\/anon.tools\/public\/blog\/\",\"name\":\"Anon Tools Blog\",\"description\":\"Digital Tools, Guarded Secrets\",\"publisher\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/#organization\"},\"alternateName\":\"AnonTools Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/anon.tools\/public\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/#organization\",\"name\":\"Anon Tools Blog\",\"url\":\"https:\/\/anon.tools\/public\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/04\/cropped-anon.png\",\"contentUrl\":\"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/04\/cropped-anon.png\",\"width\":512,\"height\":512,\"caption\":\"Anon Tools Blog\"},\"image\":{\"@id\":\"https:\/\/anon.tools\/public\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/anon.tools\/public\/blog\/#\/schema\/person\/c08bec5f31609e1ba68526ed2797c2a5\",\"name\":\"wp_An0nBLoG\",\"sameAs\":[\"https:\/\/anon.tools\/public\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Nessus Port Scanning (Part 1)","description":"Port scanner guide: Learn about Nessus port scanning in depth in this informative blog post. Understand how to optimize your security measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Nessus Port Scanning (Part 1)","og_description":"Port scanner guide: Learn about Nessus port scanning in depth in this informative blog post. Understand how to optimize your security measures.","og_url":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/","og_site_name":"Anon Tools Blog","article_published_time":"2024-06-02T02:14:13+00:00","og_image":[{"width":942,"height":628,"url":"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp","type":"image\/webp"}],"author":"wp_An0nBLoG","twitter_card":"summary_large_image","twitter_misc":{"Written by":"wp_An0nBLoG","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#article","isPartOf":{"@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/"},"author":{"name":"wp_An0nBLoG","@id":"https:\/\/anon.tools\/public\/blog\/#\/schema\/person\/c08bec5f31609e1ba68526ed2797c2a5"},"headline":"Nessus Port Scanning (Part 1)","datePublished":"2024-06-02T02:14:13+00:00","dateModified":"2024-06-02T02:14:13+00:00","mainEntityOfPage":{"@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/"},"wordCount":549,"commentCount":0,"publisher":{"@id":"https:\/\/anon.tools\/public\/blog\/#organization"},"image":{"@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp","keywords":["Nessus port scanning security measures"],"articleSection":["Port Scanning"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/","url":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/","name":"Nessus Port Scanning (Part 1)","isPartOf":{"@id":"https:\/\/anon.tools\/public\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage"},"image":{"@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp","datePublished":"2024-06-02T02:14:13+00:00","dateModified":"2024-06-02T02:14:13+00:00","description":"Port scanner guide: Learn about Nessus port scanning in depth in this informative blog post. Understand how to optimize your security measures.","breadcrumb":{"@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#primaryimage","url":"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp","contentUrl":"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/06\/nessus-port-scanning-part-1-1717294090.webp","width":942,"height":628,"caption":"port scanner"},{"@type":"BreadcrumbList","@id":"https:\/\/anon.tools\/public\/blog\/nessus-port-scanning-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/anon.tools\/public\/blog\/"},{"@type":"ListItem","position":2,"name":"Nessus Port Scanning (Part 1)"}]},{"@type":"WebSite","@id":"https:\/\/anon.tools\/public\/blog\/#website","url":"https:\/\/anon.tools\/public\/blog\/","name":"Anon Tools Blog","description":"Digital Tools, Guarded Secrets","publisher":{"@id":"https:\/\/anon.tools\/public\/blog\/#organization"},"alternateName":"AnonTools Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/anon.tools\/public\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/anon.tools\/public\/blog\/#organization","name":"Anon Tools Blog","url":"https:\/\/anon.tools\/public\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/anon.tools\/public\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/04\/cropped-anon.png","contentUrl":"https:\/\/anon.tools\/public\/blog\/wp-content\/uploads\/2024\/04\/cropped-anon.png","width":512,"height":512,"caption":"Anon Tools Blog"},"image":{"@id":"https:\/\/anon.tools\/public\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/anon.tools\/public\/blog\/#\/schema\/person\/c08bec5f31609e1ba68526ed2797c2a5","name":"wp_An0nBLoG","sameAs":["https:\/\/anon.tools\/public\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/posts\/106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/comments?post=106"}],"version-history":[{"count":0,"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/posts\/106\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/media\/107"}],"wp:attachment":[{"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/media?parent=106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/categories?post=106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anon.tools\/public\/blog\/wp-json\/wp\/v2\/tags?post=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}