Other scanners like ISS keep locally encrypted credentials (they have a related unresolved issue in their GUI, though). I know of a couple organizations that are not able to use Nessus (but would like to) because their security policy prohibits the use of any application that stores credentials in plaintext.
----- Original Message ----- From: "Michel Arboi" <[EMAIL PROTECTED]>
To: "Kevin Davis" <[EMAIL PROTECTED]>
Cc: <[email protected]>
Sent: Monday, March 07, 2005 7:03 PM
Subject: Re: Nessus wx-1.4.5a communication protocol tracer password revelation
On Tue Mar 08 2005 at 00:52, Kevin Davis wrote:
Why bother? Over a year ago I brought up the issue that both Nessus and NessusWX store these credentials locally in plaintext in a config file. No one seemed think (aside from CERT) it was a big deal then.
There are ways to protect those "nessusrc" files, e.g. store them on a removable media or an encrypted disk. Any trick at the Nessus client level would be security by obscurity.
_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
