Where am I using AI?

Casey Reid a.k.a Packet Chaos
4 min readSep 30, 2024

--

One of the timeless questions in security is “where am I using fill-in-the-blank-software or technology?”

It’s been one of the most important critical controls(#2) since the CIS Top 20, now the CIS Top 18, was released in 2008. Below is a handy graphic for the latest Center for Internet Security(CIS) critical controls:

For those not in the organized-chaos of running a large network of servers or compute resources; this is not an easily answered question as it may seem on the surface.

Software isn’t easily detected from simply scanning assets externally or hitting a cloud API. Many software components take privileged access to detect which is where Nessus comes in handy.

Nessus has been aiding accurate authenticated network scanning for over 26 years. For the uninitiated, Nessus can be used as a single scanner in a “pentest” type of a fashion or it can be deployed at scale using Tenable’s enterprise products; Security Center for an on-prem experience and Vulnerability Management as a cloud-hosted solution.

Regardless of your chosen deployment, Nessus utilizes over 221,000 plugins to detect software, open ports and of course vulnerabilities. I go into detail how to get a good software inventory in my article: “Building a Software inventory with Nessus”, which is now built into navi.

How to detect AI

In the sea of over 200,000 plugins are groups of plugin families; these plugin groups help categorized different types of plugins for a variety of use cases.

In our case, we are going to be utilizing the plugin family “Artificial Intelligence”. This plugin family detects software and software components known to use AI; 36 plugins at the time of this article.

How to make use of plugin information at scale

If you have read any of my prior articles you know that I love to Tag assets to begin a workflow or to identify a unique group of assets. It’s one of the only truly scalable and effective ways to group your assets for remediation and reporting. Here are a few articles on tagging assets:

Tagging assets by Plugin Family — “Artificial Intelligence”

To answer the question, “Where am I using Artificial intelligence”, we need navi. Navi can complete this task in a single command!

The below example makes use of the tag — query command to query the navi database directly. In this case we want the distinct UUIDs of those assets that have plugins in the plugin family “Artificial Intelligence”.

navi tag --c "AI assets" --v "AI plugins" --query "select distinct(asset_uuid) from vulns where plugin_family='Artificial Intelligence';"

When this command is triggered, navi searches the navi database and then schedules tag updates for every 2000 assets.

If you want to just see the assets on screen rather than tagging those assets in the UI, you can use the below command:

navi find --query "select distinct(asset_uuid) from vulns where plugin_family='Artificial Intelligence';"

Next Navi Release

While you can do this today with navi, I am adding a few new capabilities in the coming weeks:

  • Navi display ai — To display assets with Artificial Intelligence
  • Navi tag — byfam — To tag assets by a plugin family
  • Navi deploy ai — To deploy the docker container automatically tagging assets with AI plugin family detections.

Conclusion

The data that Nessus finds is powerful beyond just finding vulnerabilities, if used properly it can help enrich your entire security eco system. I hope you found this short solution based article helpful.

Now go find where you are using AI and complete your mission!

--

--

Casey Reid a.k.a Packet Chaos
Casey Reid a.k.a Packet Chaos

Written by Casey Reid a.k.a Packet Chaos

I'm a perpetually curious avid learner and athletic hacker/tinker who dabbles in python development, tenable integrations, philosophy, and writing

No responses yet