Thanks for the information George. On the windows side: I almost always run NessusGUI.exe, not the Nessus Client.exe. I didn't realize there were such differences in the report option.
The Nessus Client.exe look sharper, in my opinion, however, I will
continue to use the NessusGUI generated reports, due to their flexibility.
I'm also not sure where, if I wanted to tweak them, Like I did with the
NessusGUI xsl templates, I could do so. Maybe there's more options than I
realize with the .nessus format.
I *really* like the ability to list reports by the level of severity, and
exclude information stuff only. It's much easier/quicker to parse and
hand out for remediation.
I also like having the host name right by the IP address. It makes for
quicker referencing for a lot of folks on our team. Those are the 2
primary reasons I'll stick with the XSL files I created -- but it seems
like a reasonable report option to add in on your side at some point.
I don't know what other folks do, but here's a quick overview of our
process. In their current state, I'm typically the only one who even sees
the reports...
1) Run the scan for say, 20 hosts
2) Using NessusGUI.exe and some custom XSL, create reports that show mid
to upper level issues only, that must be remediated for PCI
3) From report, create 2nd doc which contains the crucial info: for
instance:
a) if there are old versions of ApplicationXYZ, which is now 3
patches behind, nessus reports 3: I cut the older 2, and just list
remediation as getting it to latest patch level
b) include where possible paths to executables of concern
(sometimes cobbled from different plugin output)
c) create final doc listing the Nessus Synopsis (and a line of
description where the synopsis is particularly vague), + solution and
plugin output (where useful)
>From there, we assign ownership for resolution and I track it all in a
spreadsheet.
Right now, I've adjusted my process to fit the tool, however, it'd be much
more efficient to have the tool fit the process. Of course, that's my
perspective. If my process/needs are unique and oddballish enough to be
fairly uncommon, then it makes sense to keep the tool as it is, too.
"George A. Theall" <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
09/26/2007 07:25 PM
To
[email protected]
cc
Subject
Re: When does a plugin include a path?
On 09/26/07 19:56, [EMAIL PROTECTED] wrote:
> I'm reviewing reports, and have noted that (in particular with Flash and
> Adobe reader plugins) there is inconsistency on when a file/version/path
> is included in the plugin output. For remediation -- I *love* that
> info. Clears up lots of questions.
>
> Case in point: 2 plugins: adobe_reader_709.nasl, and
> adobe_pdf_plugin_80.nasl -- the former: no file location output, the
> latter includes it.
>
> Is there a technical reason? Or just something that wasn't gotten
> around to? On a "to do" list?
We've been making plugins more verbose for the past several months:
version info from banner checks, version / path info for local Windows
checks, contents of files and output of commands when exploiting
vulnerabilities, etc. As you note, it greatly helps in terms of
remediation.
In cases where the info is available via another plugin, though, we've
tended to not include it to avoid redundancy and minimize code
complexity. For example, adobe_reader_installed.nasl reports the
installation path and version info of Adobe Reader on Windows systems
whereas there isn't another plugin that does this for Adobe's PDF plugin.
That said, I'd welcome feedback from you or others about the current
report format.
George
--
[EMAIL PROTECTED]
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus
<<image/gif>>
_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
