0% found this document useful (0 votes)
309 views24 pages

NESSUS Group #01 (004,042) IS Presentation

This document provides an introduction and overview of Nessus, a network vulnerability scanning tool. It discusses that Nessus can access targets on a network without special firewall or device configuration. It also summarizes the history and versions of Nessus, its main tools and functionality, the installation process, basic commands, and limitations.

Uploaded by

malaika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
309 views24 pages

NESSUS Group #01 (004,042) IS Presentation

This document provides an introduction and overview of Nessus, a network vulnerability scanning tool. It discusses that Nessus can access targets on a network without special firewall or device configuration. It also summarizes the history and versions of Nessus, its main tools and functionality, the installation process, basic commands, and limitations.

Uploaded by

malaika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

NESSUS

A Security Vulnerability Scanning Tool


Group Members

Malaika Basharat Saima Siddique


20021519-004 20021519-042
TABLE OF CONTENTS

INTRODUCTION INSTALLATION LIMITATIONS

01 02 03 04 05

BASIC
FUNCTIONALITIES COMMANDS
01
INTRODUCTION
Network & Nessus
NETWORK

■ A network consists of two or more


computers that are linked in
order to share resources.
■ Nessus is a network security tool
that can access all targets
without firewall or other network
device configuration. 
■ Nessus as a firewall
History of Nessus

■ Released in 1998
■ Renaud Deraison
■ Developed by IT security
company Tenable.io
■ Open-source project
■ Looks more than 57,000 possible
security weaknesses
■ 2 Million Users
Three Versions

Nessus Essentials Tenable.io



Nessus Professionals •
limited to 16 IP cloud-based
addresses • Paid version version of Nessus
• without the 16 IP Pro
address space cap
Main Nessus Tools
• Comes with easy installers for macOS, Linux &
windows
• Comes with .deb installers for i386 & AMD Ubuntu
• Available as a Docker Container
• Has CLI Tools (nessuscli) for external Control
• Compatible with tanable.cs
02
Functionality
Why we use nessus?
• Comes with wide array of vulnerability scans
• Scan Host discovery on internet
• Options for automated or on-demand scanning
• Continuous testing tools
• Vulnerability managers
• A link to a global intelligence database
• A free trial or a demo service that enables you to test the
tool before committing to buy
• Value for money from a comprehensive and reliable tool
that is offered at a reasonable price
Why nessus only?
• does not make assumptions about your
server configuration
• Includes vulnerabilities prioritization
• provides a plug-in interface
• Up to date information
• Enterprise level User-interface
• Quick Pushbutton Scan Types
• Easy to customized scan results
• Easy to setup SMTP notifications
• Easy to customize Report
• Provide some scanner health and
network health matrices
03
INSTALLATION
Installation
■ Open your browser and type “Nessus Essentials Download”

https://www.tenable.com/products/nessus/nessus-essentials
Downloading
Nessus Plugins Compilation
Nessus Preconfigured Scan
Nessus Scan Page
Scan of Nessus
Nessus report

Analyzing the Report


■ level of severity 
■ Suggestions to fix the problems
■ comprehensive and graphical
reports
04
Basic Commands
Basic Command
05
Limitations
Limits of Nessus

■ Nmap provides more in depth detail


■ Lacks some granular settings
■ Push Button scan Types are simple
but lack visibility
■ If lose the encryption password
then no backup
■ Scans only limited ips
Thank you!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy