Notice the scan indicates how many vulnerabilities were found.
Wait until scan is 100% complete before proceeding to the next step.
Replace 192.168.1.116 with Damn Vulnerable WXP-SP2's IP Address obtained from (Section 2, Step 6).
Place the following URL in the Firefox Browser.
| grep -v grep: Do not show my actual grep process.
| grep nessus: Only show me nessus processes.
In your case, it will probably be different.
This is the IP Address of the Victim Machine.
In my case, Damn Vulnerable WXP-SP2's IP Address 192.168.1.116.
Start -> All Programs -> Accessories -> Command Prompt.
Password: Use the Class Password or whatever you set it.
Click on the radio button "Bridged: Connected directly to the physical network".
This is the Victim Machine that we will be scanning with BackTrack5R1.
Login to Damn Vulnerable WXP-SP2 (Victim Machine)
Navigate to where the BackTrack5R1 VM is located.
Scan Damn Vulnerable WXP-SP2 with Nessus.
NESSUS: Lesson 2: Install Nessus on BackTrack 5.
BackTrack: Lesson 1: Installing BackTrack 5.
Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.
Tenable Network Security provides enterprise-class solutions for continuous monitoring and visibility of vulnerabilities, configurations, user activity and system events that impact security and compliance.