记 Nessus 扫描工具 51192 - SSL Certificate Cannot Be Trusted 漏洞修复!

一、关于 Nessus 扫描工具

Nessus —系统漏洞扫描与分析软件!

Nessus 是全世界最多人使用的系统漏洞扫描与分析软件,总共有超过75,000个机构使用Nessus 作为扫描该机构电脑系统的软件。

Nessus对个人用户是免费的,只需要在官方网站上填邮箱,立马就能收到注册号了,对应商业用户是收费的。

0869a5b427e1b0454e1713cdeaf340b5.png

048c198150d1a6ac1f5bcdbd9e02e39b.png

6be2242045a975d738a69ef7e240adc3.png

二、扫描漏洞报错信息

源网页漏洞内容:

Vulnerabilities

51192 - SSL Certificate Cannot Be Trusted

-

Synopsis

The SSL certificate for this service cannot be trusted.

Description

The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.

ad11ee89cde101856ad3966fce3554e1.jpeg

漏洞翻译后提示如下:

主机信息

IP:

127.0.0.1

OS:

微软Windows

脆弱性

51192-SSL证书不可信

梗概

此服务的SSL证书不可信。

描述

服务器的X.509证书不可信。这种情况可以以三种不同的方式出现,其中信任链可以被打

- First, the top of the certificate chain sent by the server might not be descended frc

the chain is an unrecognized, self-signed certificate, or when intermediate certificat

public certificate authority.

-其次,证书链可能包含扫描时无效的证书。当扫描发生在证书的"notBefore"日期之前,

-第三,证书链可能包含与证书信息不匹配或无法验证的签名。错误的签名可以通过让颁发

不支持或不识别的签名算法的结果。

如果远程主机是生产中的公共主机,链条上的任何断裂都会增加用户验证web服务器真实

三、漏洞修复解决方案

通过查阅资料并尝试测试,找到如下临时解决方案,生成CA证书文件,并设置为自定义CA证书文件!

方法如下,仅供参考:

1.用管理员身份运行命令程序 nessuscli.exe

nessuscli.exe 命令位于目录路径:C:\Program Files\Tenable\Nessus\

2.敲入命令生成证书

C:\Program Files\Tenable\Nessus\nessuscli.exe mkcert

生成后的证书文件位于 CA 文件夹,共有4个证书文件!

3.设置自定义CA证书文件

打开软件 setting 设置选项,将生成的 CA 文件夹中的第一个证书文件,打开,复制粘贴进 CustomCA

42b5f1cb585c5dfaa57778a12e006025.png

5068adb9b069de6d3126385c42915001.png

Nessus 扫描工具扫描后无该项漏洞风险提示,但http访问还是风险!

参考来源:

1.How To Resolve "51192 SSL Certificate Cannot Be Trusted" via certificate push

https://community.tenable.com/s/article/How-To-Resolve-51192-SSL-Certificate-Cannot-Be-Trusted-quick-Fix?language=en_US

2.Certificates and Certificate Authorities

https://docs.tenable.com/nessus/Content/Certificates.htm

3.Create a New Server Certificate and CA Certificate

https://docs.tenable.com/nessus/Content/CreateANewCustomCAAndServerCertificate.htm

·················END·················

你好,我是二大爷,

革命老区外出进城务工人员,

互联网非早期非专业站长,

喜好python,写作,阅读,英语

不入流程序,自媒体,seo . . .

公众号不挣钱,交个网友。

读者交流群已建立,找到我备注 “交流”,即可获得加入我们~

听说点 “在看” 的都变得更好看呐~

关注关注二大爷呗~给你分享python,写作,阅读的内容噢~

扫一扫下方二维码即可关注我噢~

eb0fb4ae0f42dd867bea7171636f6b41.jpeg

528b2c8f44f9585bd0f21fbfd68eeff1.png

关注我的都变秃了

说错了,都变强了!

不信你试试

7f6c4740485cb16d2b1cea1a9582d9c9.jpeg

扫码关注最新动态

公众号ID:eryeji

  • 11
    点赞
  • 7
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值