Tenable Lab Guide
Tenable Lab Guide
v1.2
TABLE OF CONTENTS 3
VERSION CONTROL 7
HOW TO USE THIS GUIDE 8
FAQ 8
Q: Can I write an exam after this? 8
Q: Can I skip ahead? 8
Q: My scans won’t complete, will I fall behind? 8
Prerequisites 8
KEY TERMINOLOGY 9
LAB 0 - CONFIRM LAB SANDBOX LOGIN (5 MINUTES) 10
Lab 0: Task 1 - Login to your Vulnerability Management Lab Sandbox 11
Short Instructions 12
Step-by-Step Instructions 12
Step 1 - Login to your Vulnerability Management Lab Sandbox 12
LAB 1 - DATA ACQUISITION (30 MINUTES) 16
Lab 1: Task 1 - Perform a Host Discovery Scan 17
Scenario: New Site 17
Short Instructions 17
Step-by-Step Instructions 17
Step 1 - Create a scan using the Host Discovery template: 17
Step 2 - Edit and launch the host discovery scan: 17
Analysis: 19
Lab 1: Task 2 - Perform a Credentialed Vulnerability Scan 20
Short Instructions 20
Step-by-Step Instructions 20
Step 1 - Create a scan using the Basic Network Scan template: 20
Step 2 - Edit the scan: 20
DO NOT DISTRIBUTE Page: 2 | Table of Content
Step 3 - Add SSH and Windows credentials: 20
Analysis: 22
Lab 1: Task 3 - Create and Launch a Tag-Based Scan 24
Short Instructions 24
Step-by-Step Instructions 24
Step 1 - Create asset tag: 24
Analysis: 24
Step 2 - Create a tag-based scan: 25
Analysis: 25
LAB 2 - WEB APP SCANNING (30 MINUTES) 26
Lab 2: Task 1 - Configure a Web Application Scan 27
Scenario: Newly Discovered Web App 27
Short Instructions 27
Step-by-Step Instructions 27
Step 1 - Install the Selenium IDE extension: 27
Step 2 - Setup a vulnerable web app with credentials: 28
Step 3 - Create a selenium script, using the Chrome extension: 28
Step 4 - Create and run a web app scan using the selenium script 29
Analysis: 30
LAB 3 - PRIORITIZATION (30 MINUTES) 31
Lab 3: Task 1 - Vulnerability Priority Rating (VPR) Analysis 32
Scenario: Where Should We Focus? 32
Short Instructions 32
Step-by-Step Instructions 32
Step 1 - Create a Filter for VPR 9 or Higher Items: 32
Analysis: 32
Lab 3: Task 2 - Accounting for Business Context 34
Short Instructions 34
Step-by-Step Instructions 34
Step 1 - Create and filter with tags for business critical assets: 34
Analysis: 34
Step 2 - Edit and understand the value of ACR, as well as AES: 34
FAQ
Prerequisites
● Google Chrome web browser with internet access and the ability to add extensions.
● Access to your corporate email account.
● Access to your Lab Sandbox.
○ Credentials are delivered by email prior to the session, following this format:
■ From: [email protected]
■ Subject: Tenable University Lab Access Information
○ If you did not receive an email with your Lab Sandbox credentials, notify your instructor.
● Links are provided throughout from the primary Tenable documentation landing page, and more specifically from:
Sample email:
Product URL Username Password Notes
Vulnerability {FirstLetterLastName}@{classNam
https://cloud.tenable.com ****
Management e}.training
https://{First}-{LastName}-{classID}-
Use a separate browser
TenableCore core-
admin Tenable123456789! window opened in
Nessus* nessus.labs.university.tenable.com:8
incognito/private mode
000
https://{First}-{LastName}-{classID}-
Use a separate browser
TenableCore Nessus core-
admin **** window opened in
Network Monitor* nnm.labs.university.tenable.com:800
incognito/private mode
0
Along with the email containing credentials, each student is allocated 2 Nessus scanners, 2 agents and 3 targets.
Students are free to scan all systems, but three of them are designed specifically to be targets:
scanadmin/Tenable123!
Amazon Linux - Target {First}-{LastName}_Linux Yes No 10.0.0.0/24
(creds will fail by design)
*students should scan the /24 block as each assigned targets will have a randomized IP within the range
Short Instructions
Confirm access to your Vulnerability Management Lab Sandbox.
Step-by-Step Instructions
Due to the email delivery mechanism, a newline character is typically appended to the
QUICK TIP
username and/or password (if double-clicking to select text within a cell). To prevent credential
DO NOT DISTRIBUTE Page: 9 | Table of Content
lockouts, ensure to remove any newline/whitespace characters before testing.
Step-by-Step Instructions
Due to the email delivery mechanism, a newline character is typically appended to the
QUICK TIP username and/or password (if double-clicking to select text within a cell). To prevent credential
lockouts, ensure to remove any newline/whitespace characters before testing.
Short Instructions
Perform a host discovery scan (with operating system identification) of the 10.0.0.0/24 subnet.
Step-by-Step Instructions
Ensure to add your initials to any items you create throughout the labs. Your instructor will use
QUICK TIP this identification to provide assistance. As an example, John Smith would title this scan:
● JS - Discovery Scan with OS ID
Analysis:
1. When the scan completes, select the name of your scan (back in the Scans view) and select See All
Details. Answer the following questions:
a. How much time did the scan take to complete?
c. Select one asset and find out how much time was spent scanning that specific asset (this should
be a lesser value than the entire scan duration).
■ Review plugin ID 19606: Nessus Scan Information
■ Learn about three use cases for plugin ID 19506.
d. Were there any hosts for which the OS type was not identified?
■ Learn more about OS Identification.
e. What is the level of severity for the plugins that results from this scan?
Short Instructions
Perform a credentialed network scan of the 10.0.0.0/24 subnet.
Step-by-Step Instructions
To scale credential management within your organization, you can also select Save to
Managed Credentials, allowing the re-use of credentials for more than one scan, without
submitting them again:
QUICK TIP You can also follow the Create a Managed Credential guide to add them directly.
Managed credentials are available for review from Menu > Settings > Credentials. They can
also be added directly when editing scans, expanding the credential type row MANAGED
CREDENTIALS, and selecting the appropriate credentials:
2. Filter the aggregated results to understand which hosts are failing to run local checks.
a. From the hamburger Menu, select Findings (under Explore).
b. Under Vulnerabilities, select Advanced and clear all filters by selecting the X to the right (directly
to the left of Apply).
c. Select the box where it says Enter filter query…
■ Notice how filters are available to scroll through.
d. Type: Plugin (do not copy & paste).
■ Notice how filters change based on the submission.
e. Select Plugin ID.
f. Select is equal to.
g. Type: 21745
■ Review plugin ID 21745: OS Security Patch Assessment Failed
h. Select Apply
If you select Advanced again from this view, notice how a bubble appears with the filter you
created. This reverts you back to the Basic view (default view). You can toggle back and forth by
selecting Advanced.
When in the Basic view, you can select the filter option to the left of Advanced. Notice how
QUICK TIP this expands your filtering options. You can then click Select Filters and manually add and edit
filters.
Discover if the Basic or Advanced view works best for you and find out more about filtering
Explore Tables.
Short Instructions
Tags add business context to your assets with descriptive metadata and can either be statically defined or
dynamically applied with enhanced filtering capabilities.
In this part of the lab, you will create a tag to identify Windows 2016 servers, then use this tag to launch a scan.
Step-by-Step Instructions
Analysis:
1. Learn more about navigating and editing tags.
2. Find and select your tag under the hamburger Menu > Settings > Tagging
a. How many assets are tied to this tag?
b. How could you edit the associated value in the future?
Using a discovery-only public cloud connector (AWS, Azure, GCP), you can identify both the
private IP (RFC1918) or the public IP (non-RFC1918) addresses of cloud assets (EC2 instances or
QUICK TIP
VMs). Should you create a tag to capture these assets, the IP Selection option allows you to
target whichever IP is relevant to your scan.
Analysis:
1. Did the scan correctly limit the targets in scope to Windows 2016 Server within our subnet?
2. Did the scan identify the same number of vulnerabilities, in comparison to our previous scan that used the
Basic Network Scan template? Identify why.
3. What benefits are there to using tags instead of specifying targets within a scan?
○ Learn more about asset tags.
-End of Lab 1-
● Create a credentialed web application scan with Selenium authentication. Note that Selenium-based
authentication is used for example purposes. The API Key, Bearer Token, Cookie and Login Form options are
also available.
Short Instructions
Add the Selenium IDE Chrome extension, setup a vulnerable application using the Google project Gruyere and
create a scan to analyze this web application.
Step-by-Step Instructions
If you are planning to use the extension in Incognito mode, navigate to chrome://extensions,
find the extension and select Details, then scroll down and toggle on Allow in Incognito.
QUICK TIPS
Did you know that the Tenable WAS Chrome extension is going away? Read more about the
EOL announcement.
2. Select the chrome extension . You may need to pin it to the toolbar using if you do not see it.
○ Notice the pop-up window.
3. Select Record a new test in a new project.
○ Title your project, then select Ok.
4. Past the URL of your Gruyere app (as the BASE URL), then select Start Recording.
5. In the new window to popped up showing the Gruyere app, select Sign in (top right corner)
6. Submit credentials:
○ User name: admin
○ Password: password
7. Select Login.
8. Close your browser window.
Step 4 - Create and run a web app scan using the selenium script
1. From the workspace tab, navigate to Web App Scanning.
2. Navigate to Scans (top left menu).
3. Select Create Scan.
4. Select Custom Scan, then modify the General values:
○ Scan Name: {Your Initials} - Credentialed WAS
○ Targets: {your gruyere URL}
i. After you add your target, select Add to Targets list.
5. Select Advanced and change the Target scan max time to 00:10:00 (10 minutes).
○ This will ensure some results are available within 10 minutes of the scan start time.
6. Select Credentials.
7. Select Add Authentication Type, then Web Application Authentication.
8. Change the Authentication method from Login Form to Selenium.
9. Modify the following values:
○ Name: {Your Initials} - Gruyere
○ Page to verify active session: https://google-gruyere.appspot.com/{yourCustomUrl}/editprofile.gtl
○ Pattern to verify active session: Edit your profile.
10. Select Add File and upload your script.
11. Select Save New Authentication.
12. Select your newly added credentials under Previously Saved Credentials.
○ Notice how they move to the left section.
13. Select Save and Run.
○ Notice your scan under the My Scans page.
14. While you wait for the scan to complete:
DO NOT DISTRIBUTE Page: 25 | Table of Content
○ Learn more on all available web application authentication methods.
Analysis:
1. When the scan completes (within 10 minutes of the scan start time), review the scan findings.
a. Select the scan name then See All Details.
b. Confirm that the Selenium authentication was successful. Learn more about:
■ Plugin ID 98141: Selenium Authentication Succeeded,
■ Plugin ID 98142: Selenium Authentication Failed
■ Plugin ID 98143: Selenium Crawl Succeeded
■ Plugin ID 98145: Selenium Crawl Failed.
c. Find and analyze various findings, such:
■ Plugin ID 98104: Cross Site Scripting (XSS).
■ Plugin ID 113338: Web Cache Poisoning
■ Plugin ID 98138: Screenshot
■ Plugin ID 98009: Web Application Sitemap
d. Notice the available data points such as payload, proof, output, HTTP request and response.
e. Download and review an attachment from a vulnerability findings.
f. For additional content, review any of the other available web application scan results.
2. Notice how under the hamburger Menu > Explore > Findings you can review Web Application Findings
along other vulnerability findings.
a. Use an advanced filter to find the Gruyere web app vulnerabilities from this aggregate view.
-End of Lab 2-
Short Instructions
Create a filter for VPR of 9 or greater, review findings and identify which assets carry those vulnerabilities.
Step-by-Step Instructions
Analysis:
1. Remove the filter and sort the Severity column from most severe to least severe (i.e. Critical > High >
Medium > Low). Re-apply the VPR filter and sort the VPR column from greatest to least (i.e. 10 > 9). Are the
same vulnerabilities at the top of the list?
a. Learn more about the Vulnerability Priority Rating (VPR).
b. Learn more about the difference between CVSS and VPR.
2. With the VPR filter still on, select a vulnerability from the list.
a. Select See All Details.
3. Select Back to Findings, and with the VPR filter still on, what value would there be in changing the Group
By view from the None (the default) to Plugin? What is the default sorting order? Define Vuln Count.
a. Learn more about grouping findings.
4. With the VPR filter still on, now group by Assets. What value does this bring?
Short Instructions
Create tags for business critical assets, review and edit ACR of assets, and understand how it all comes together.
Step-by-Step Instructions
Step 1 - Create and filter with tags for business critical assets:
Management has provided you with a list of 3 business critical assets located at the headquarters which must be
tracked closely.
1. From the hamburger Menu, select Assets (under Explore).
2. Select a handful of assets manually (using the check boxes to the left).
○ These represent business critical assets.
3. Select Add Tags.
4. Select your existing category and create a new value:
○ Category: {Your Initials} - Headquarters
○ Value: Business Critical
Analysis:
1. Now that we have an asset tag for business critical assets, how would you filter for related vulnerabilities?
2. How would you find vulnerabilities with VPR greater than or equal to 9, only on business critical assets?
Analysis:
1. How will increasing the ACR impact an asset’s AES?
a. Learn more about AES.
2. Learn more about the Lumin timing.
-End of Lab 3-
Short Instructions
Create a dashboard using the existing Vulnerability Management template, targeted at business critical assets.
Step-by-Step Instructions
Step 1 - Create a copy of the Vulnerability Management dashboard for business critical assets:
1. Back within the Vulnerability Management app and from the hamburger Menu, select Dashboards.
2. Select New Dashboard, then Template Library.
3. Search for the template: Vulnerability Management (Explore)
4. Hover over the template, then select Preview.
○ Read about this dashboard.
5. Select Add to Dashboards.
6. Scroll down. You’ll find this dashboard as Copy of Vulnerability Management.
7. Select the three vertical dots to the right of the dashboard
○ Observe the available options.
8. Select Edit.
9. Hover over the title of this dashboard (top left corner) and select the pencil .
10. Rename the dashboard as: Vulnerability Management (Business Critical Assets)
11. Select the checkmark to save this name change.
12. Select Edit Filter (top right).
13. Select All Assets and change it to Asset Tags.
14. Select your Business Critical asset tag.
15. Select Apply.
○ Observe the widgets update to only show data points related to business critical assets.
○ Learn more about filtering dashboards.
DO NOT DISTRIBUTE Page: 34 | Table of Content
16. Select Done Editing.
Analysis:
1. Of all vulnerabilities related to business critical assets, what percentage are exploitable?
2. Which business critical assets carry the most exploitable vulnerabilities?
3. Select an asset within the Top 100 Most Vulnerable Assets widget? What behavior did you just observe?
4. How would you share this dashboard with others?
○ Learn about dashboard management.
5. Schedule a detailed PDF export of this dashboard to be sent to you over email, monthly, starting in the
next half hour.
○ Learn about dashboard exports.
6. Review the dashboard feed.
Short Instructions
Create a custom dashboard using existing widgets, specific to business critical assets.
Step-by-Step Instructions
Analysis:
1. What data points could you see your organization use today?
2. Within your custom dashboard, how would you modify a specific widget to show findings related to
different assets than the business critical assets already being filtered for?
○ Learn more about configuring widgets.
3. Create your own custom widget and add it to your custom dashboard.
○ Learn more about custom widgets.
Short Instructions
Create a report that fits leadership’s requirements using the existing Vulnerability Detail Report template.
Step-by-Step Instructions
Analysis:
1. What is the total of unmitigated Critical and High vulnerabilities?
4. Schedule a PDF export of this report to be sent to you over email, monthly, starting in the next half hour.
○ Learn more about scheduling reports.
-End of Lab 4-
Short Instructions
Allocate 300 assets to your own inventory, add a domain and improve the associated records.
Step-by-Step Instructions
Short Instructions
Review assets, reporting and add subscriptions.
Step-by-Step Instructions
Step 1 - Review assets
1. Navigate to your inventory and hover over an asset and select the to the right.
a. Notice the fields available.
b. If you select an asset with a custom tag, you’ll see it under Custom columns.
2. Navigate back to your inventory and select .
a. Select Render Assets as Table.
■ Notice that you can export various tables.
-End of Lab 5-
COPYRIGHT 2023 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, NESSUS, LUMIN, ASSURE, AND THE TENABLE
LOGO ARE REGISTERED TRADEMARKS OF TENABLE, INC. OR ITS AFFILIATES. ALL OTHER PRODUCTS OR SERVICES
ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.