Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

#7 Nessus Versus Malware - Top Ten Things You Didn't Know About Nessus

Nessus has several different plugins and techniques for helping you with the fight against malware. The video below is part 7 in our series of the top ten things you didn't know about Nessus and covers 3 different ways Nessus can be used to help detect malware:

Below are a few more examples of how Nessus can detect malware:

1. Nessus Network Checks

Nessus plugins in the "Backdoor" plugin family detect certain types of generic behavior on listening services that are indicative of malware. For example, plugin #35322 detects the presence of an HTTP backdoor. Nessus detects the web server remotely and identifies a condition where the web server, regardless of the request, returns a Windows executable:

Screen Shot 2012 01 04 at 12 56 22 PM

Conficker and the Downadup worm used this method to propagate. This is a sure fire indication that the host has been compromised.

Nessus can also detect if one of your web sites is hosting malicious JavaScript. In this condition, two things are being detected: 1) The fact that your web site is vulnerable in some way which allows attackers to modify the content and 2) Clients going to the web site will likely get infected via the JavaScript code:

Screen Shot 2012 01 04 at 12 57 10 PM

The Lizamoon malware used this method to propagate.

2. Nessus Credentialed Plugin Checks

Nessus will use credentials to login to a system, on a Windows platform for example, and search the registry and file system for indications of well-known malware:

Screen Shot 2012 01 04 at 12 57 51 PM

Most strains of Zeus/Zbot can be detected in this manner.

A separate plugin (id 23910) can look at your system and identify if the Windows hosts file has been tampered with:

Screen Shot 2012 01 04 at 12 58 22 PM

Some malware will add entries to this file forcing entries to anti-virus software companies update servers to somewhere else.

Nessus will also check that any target IP address or host name is part of a known botnet. This check is performed against each target, and the known botnet hosts list is updated regularly via plugin updates and pulls from multiple sources.

Screen Shot 2012 01 04 at 12 58 57 PM

Nessus contains information about anti-virus software and identifies hosts with no anti-virus software installed, outdated anti-virus software installed, and definitions that are out-of-date.

3. Nessus Configuration Auditing Checks

Using configuration auditing Nessus can dig deeper into your systems and detect malware infections such as the Duqu virus and more!

Screen Shot 2012 01 04 at 12 59 29 PM

In addition to detecting the presence of anti-virus software that is contained in the plugins, audit files can tell you more information about your anti-virus installations, such as if the anti-virus software is set to start on boot.

Stay tuned for the next video in our series which will cover scanning IPv6 hosts!

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security