2.17-Scan Device for Default Admin Password
Task Scan Device For Default Admin Passwords¶
Conditions¶
Given a suspected compromised network segment(s), access to a system that can access and scan the identified network devices, and scanning software included in the team’s incident response kit.
Standards¶
Team Member Scans network for devices with default passwords
Idenitfy devices and notify network owner
End State¶
All devices on nework with weak or default passwords will be identified.
Manual Steps¶
First thing you want to do is log into nessus via the IP of the nessus server with the port 8834.
example https://x.x.x.x:8834
Once Logged in, verify you have the correct plugins enabled:
* Scans > New Scan > Advanced Scan
* Click the Plugins tab > Click Filter at the top toolbar
* Change the drop down to "Default/Known accounts" and click apply
* The list of 'Enabled' plugins will switch to just the filtered plugins
If there were some that were not enabled for default/known account filter just enable them.
-
Once verified create a new scan
- Create advanced Scan
- Add the title or name (weak & Known password scan)
- Type in the IP range i.e. x.x.x.x/24
-
Leave all other settings default
- Save
- Launch Scan
Dependencies¶
- Nessus Server
Other available tools¶
N/A
References¶
Nessus Plugins
Nessus Default Credentials