Given a suspected compromised network segment(s), access to a system that can access and scan the identified network devices, and scanning software included in the team’s incident response kit.
Operator Note: Default or weak admin credentials are a common foothold used by attackers. Identify and report them immediately.
Operator Note: Always coordinate with network owner prior to scanning production systems.
All devices on network with weak or default passwords will be identified.
Operator Note: Results should be documented, validated with system owners, and used to plan remediation actions.
8834
.Example:
https://x.x.x.x:8834
Operator Note: Some plugins may be disabled by default for safety. Review plugin descriptions carefully.
Weak & Known Password Scan
x.x.x.x/24
)Operator Note: Findings may include embedded device logins, network appliances, and misconfigured admin interfaces.
dpkg -i Nessus-latest-debian6_amd64.deb
sudo /bin/systemctl start nessusd.service
https://localhost:8834
Operator Note: Install Nessus on isolated assessment VM or approved incident response host.
nmap --script=default-credentials -p 22,23,80,443 x.x.x.x/24
hydra -L users.txt -P passwords.txt 192.168.1.1 ssh
Operator Note: Nmap can identify default credentials passively, Hydra is active/password guessing and should only be used with explicit authorization.
Nessus Plugins
Nessus Default Credentials
Nmap NSE Default Credentials
Platform | Tool | Purpose |
---|---|---|
Universal | Nessus | Primary tool for known/default password scans |
Linux/Windows | Nmap NSE scripts | Optional passive scan for embedded device defaults |
Linux/Windows | Hydra | Advanced password brute-forcing (authorized use only) |
nmap --script=default-credentials -p 22,23,80,443 192.168.1.0/24
hydra -L users.txt -P passwords.txt 192.168.1.50 ssh
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.8 | Full original + enriched Nessus + alternative tooling + operator recommendations | Leo |