0% found this document useful (0 votes)
316 views15 pages

Nessus

Nessus is a vulnerability scanner founded in 1998 that allows users to detect vulnerabilities in systems like Windows, Linux, and Mac. It uses a web interface to install, scan systems, and generate reports on remote vulnerabilities. Nessus can manage up to 50,000 hosts with recommended hardware of a dual-core 2GHz CPU, 2GB RAM, and 30GB disk space or more for larger installations. Users download Nessus from Tenable's website, register for an activation code, install it, create an account, and then can start configuring policies and launching scans on target systems or networks.

Uploaded by

Aizzad Helmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
316 views15 pages

Nessus

Nessus is a vulnerability scanner founded in 1998 that allows users to detect vulnerabilities in systems like Windows, Linux, and Mac. It uses a web interface to install, scan systems, and generate reports on remote vulnerabilities. Nessus can manage up to 50,000 hosts with recommended hardware of a dual-core 2GHz CPU, 2GB RAM, and 30GB disk space or more for larger installations. Users download Nessus from Tenable's website, register for an activation code, install it, create an account, and then can start configuring policies and launching scans on target systems or networks.

Uploaded by

Aizzad Helmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

• Nessus was founded by Renuad Deraison in the year 1998 to provide to the Internet

community a free remote security scanner.


•It is vulnerability scanner which allow you to detect vulnerability in your system.
•It is very popular vulnerability scanner which support Windows , Linux and Mac operating
system etc.
•Nessus uses web interface to install , scan and report the various vulnerabilities.
•It identifies vulnerabilities that allow remote attacker to access sensitive information rom
the system.
Hardware Requirement
Nessus managing up to 50,000 hosts

• CPU: 1 dual-core 2 GHz

• CPU Memory: 2 GB RAM (4 GB RAM recommended)

• Disk space: 30 GB

Nessus managing more than 50,000 hosts

• CPU: 1 dual-core 2 GHz CPU (2 dual-core recommended)

• Memory: 2 GB RAM (8 GB RAM recommended)

• Disk space: 30 GB (Additional space may be needed for reporting)


Download and Installation
• You can download it from https://www.tenable.com/products/nessus/nessus-
professional
• Once you download it then register
https://www.tenable.com/products/nessus/activation-code
• Then install the tool.
• Open the Nessus in the browser http://localhost:8834/WelcomeToNessus-
Install/welcome
• Create an account and then fill the activation code
• Then downloads the necessary plugins.
• After completion of installation you redirect to the login page and put your credential
their.
Policies
• Policies are nothing but the vulnerability test. There are 4 default policie.
1. External network scan
2. Internal network scan
3. Web App Tests
4. Prepare for PCI DSS (Payment Card Industry Data Security Standards)
• Create a new policy by clicking on New policy button:
Choose the type of scan that you want to perfom on your network.
Now I am selecting the basic network scan on my IP address for this you can give
whatever name you want and then give the little description and it is optional
Now go to the credential and then if you are using Linux or Mac OS choose Host otherwise
Windows for windows XP users and also fill the username and password by choosing
password in the authentication method
There are so many plug-in available in Nessus,click on save button to save your policy.
After saving the policy it automatically redirect to the page where you can see the newly
created policy by their name

Now you have successfully created the policy.


Now click on New Scan button and start the scanning process you can also create an folder
if you want and then perform the scan in that particular folder

Now choose the basic network scan to check all the vulnerability in our particular ip
address
Here give the name to your scan and add little bit description and add the folder.
In targets field you can give the one or more IP Addresses for scanning. And then click on
launch button to start scan.
You can see the status as running ,it will take some time because it is scanning all the
vulnerability in our network IP Address
Now you now see the pie chart and the go to the vulnerabilities section
It will show you all the available vulnerabilities present in my network and double click on
any vulnerability to see the description about it.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy