Finally a new release of Nessus, the most famous Vulnerability Scanner, has been released. The new release has improvements and fixes as:
– It is now possible to define a global maximum number of packets per second sent by the SYN scanner, no matter how many scans are running, by setting the option nessus_syn_scanner.global_throughput.max in nessusd.conf (for instance, setting nessus_syn_scanner.global_throughput.max = 10000 guarantees that nessusd will not send more than 10,000 packets per second during the port scan phase). Use this feature if you’re scanning through fragile firewalls or if you want to reduce the impact of the port scan on the network ;
– Backend database can automatically switch from the “high” memory usage (which uses more memory but is faster during the scan) to “low” (which uses less memory but slows scans down a little) when nessusd can’t allocate enough memory. In 4.4.0, Nessus would abort if it could not load the database in memory ;
– Along the same lines, new installs on 32 bits machines are now defaulting to the “low” memory usage. Change this to qdb_mem_usage = high in nessusd.conf if you have plenty of memory and want to conduct faster scans ;
– Packet forgery scales much better. As a result, network discovery is faster now ;
– Custom plugins now handle the import() call (4.4.0 regression) ;
– The scans would sometime “hang” on Solaris 10 ;
– nessusd is better at returning memory to the kernel when a scan is finished (Linux, Windows) ;
– We added packages for SuSE 11 (32 and 64 bits)
– The Linux “generic” builds are now a fully static binary
– The Ubuntu 10.10 builds now contain their own version of OpenSSL, as Ubuntu silently dropped support for SSLv2.
You can download Nessus from the Official Download Page and read more about new version on the blog.