How do it..

Perform the following steps:

  1. Open the Nessus web client.
  2. Log in to the Nessus client with the user that you created during installation.
  3. Click on the Policies tab and select Create New Policy. Then, select the Basic Network Scan template:

Alter the settings in the Discovery tab for the port scan by mentioning a range from 1-1000. This will allow the scanner to complete the scan quickly:

  1. Ensure that Perform thorough tests is not selected in the accuracy tab of the General settings category in ASSESSMENT:

This will ensure that the PLC or any other device on which you are performing the scan is not affected in any way due to the traffic produced. You can also set advanced settings to ensure that minimal traffic is generated:

  1. Ensure that the SCADA plugins are present in the Plugins tab, otherwise the results obtained would only be for non-SCADA ports:

  1. Save the policy and select New Scan from the My Scans folder. Navigate to the User Defined policies section and select the policy:

  1. Select the policy and fill in the required details. Then, launch the scan:

  1. Wait for the scan to complete and open the results:

The preceding results show us that the scan was successful and that Nessus has found two SCADA-related vulnerabilities:

  • ICCP/COTP (ISO 8073) Protocol Detection:

  • Modbus/TCP Coil Access:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.13.201