I was preparing to turn in after a successful night, when I realized that I should probably share it with you all.I have been wanting to use a vulnerability scanner at home to see my vulnerabilities, and get some experience doing it. I have been looking at Nessus, but I didnt feel ready to go for it, and I worried with some modules requiring payment. While looking into Metasploit Unleased in an attempt to understand tools I was using in my studies, I found a scanner called NeXpose from Rapid7, the owners of the popular Metasploit Framework. So I am writing a quick review based on my experience.
NeXpose is vulnerability management software from Rapid7. The community edition is a free single user license program. One of the first things I noticed is that it claimed to be a full vulnerability management program, unlike the Secunia PSI program I use, which only scans for out of date/EOL/vulnerable software.
In any case, I looked into the program after a short registration process, I was emailed the activation code and the email included links to the download, and the software manual. I downloaded and began reading the manual while downloading the software, and found it easy to understand, and the walkthough was fairly comprehensive. I defiantly appreciated that, although it was not really necessary for most of the installation.
Installation was a breeze, no configuration changes necessary during install although according to documentation, security software will interfere with its use, so they appear to want you to disable WF, and any other applications that could interfere, AV was mentioned, I assume because of the exploit databases. Obviously this will require forward planning, insure your hosts are behind a boundary firewall, if you require internet connectivity (which you will at least for the program update)
The one issues I encountered that was not noted in the manual was issues that ended up being caused by Internet Explorer's enhanced security configuration (The software is supported on Windows Server 2k and 2k3 and Linux OS' only)
There was one additional issue after I completed my first scan, where the program stayed at the scanning page, but the console said the scan was done, I simply closed and reopened the browser, and it was GTG.
Scanning time was fairly quick, I would say under 5 minutes for one host, but I wasnt counting, It may have been closer to 3. I was able to monitor the action via the program's console, in which the program would attempt to access services, attempt exploits. I am pleased to announce that it only found 1 vulnerability, which it gave me an easy to follow recommendation for remediation. I can say there is little else as pleasing as seeing those words scroll by: NOT VULNERABLE, LOGIN ATTEMPT FAILED, ect... I'll be glad to answer any questions you guys may have, and thanks for letting me share.