Building a Nessus Test
Building a new Nessus Test Case is straight forward. First, create a scan policy within Nessus. If you have a specific audit file that you would like to use (ex: one downloaded from the IASE website), you must first upload it into Nessus. Instructions for uploading an audit file and creating a s...
Custom Networking for Scanning in DISA milCloud
By default, the CONS3RT Elastic Test Tool VMs connect to the "CEMS network" in your HmC VDC. In order to allow the test tool VMs to scan additional networks inside your DISA milCloud VDC, a custom Red Hat 6 template may be required. To create this custom template:
Log in to your HmC VDC in vCl...
Elastic Test Tools
CONS3RT supports the following tools as Elastic Test Tools:
Vulnerability scanning, malware detection
Configuration auditing, compliance checking
Web Exploit Suite
A suite comprised of three tools (Nmap, Nikto, and Metasploit)
Identifies IP addresses, ports, services, and known...
ETT Power Management
ElasticTest tools power down once the tests have been completed. This will help free up resources in your cloudspace. If a re-test is requested, the tools will power on for only the duration of the test.
Users have the ability to create Test Assets to run on-demand HP Fortify scans using the Fortify Elastic Test Tool. Scans can also be run against any software assets that contains or stages source code.
How to Run a Fortify Scan
Step 1: Create a Fortify Test Asset
There is a Sample Fort...
Import a Test Asset
First, create a zip file containing the contents of your Test Asset
From the main navigation menu, click Tests
Click the Plus + button at the top-right
Drag and Drop or select your Test Asset Zip File
You will receive an email when the Asset import has completed
Find your new Test Asset at the to...
Nessus Test Configuration and Nessus Test Assets
Nessus Test Assets allow for on demand vulnerability scanning and auditing of all deployment runs (i.e., both newly provisioned and long standing). There are two was in which Nessus Test Assets can be used:
Part of a Deployment - By default, adding a Nessus Test Asset to a deployment will scan a...
Nessus Test Structure
All Nessus Test Cases consists of a Policy file and (optional) Audit file. A scan policy consists of configuration options related to performing a vulnerability scan. These options include, but are not limited to:
Parameters that control technical aspects of the scan such as timeouts, number of ...
Troubleshooting a Test Error
If you encounter a Test Error in a Nessus Scan with an error message including invalid credentials, simply click the Re-Test button. This is an issue with the Nessus product, and we are working on a fix to avoid this issue in the future.