laconcept.blogg.se

How to use nessus backtrack 5
How to use nessus backtrack 5






  • Notice the scan indicates how many vulnerabilities were found.
  • Wait until scan is 100% complete before proceeding to the next step.
  • how to use nessus backtrack 5

  • Replace 192.168.1.116 with Damn Vulnerable WXP-SP2's IP Address obtained from (Section 2, Step 6).
  • Place the following URL in the Firefox Browser.
  • | grep -v grep: Do not show my actual grep process.
  • | grep nessus: Only show me nessus processes.
  • In your case, it will probably be different.
  • This is the IP Address of the Victim Machine.
  • In my case, Damn Vulnerable WXP-SP2's IP Address 192.168.1.116.
  • Start -> All Programs -> Accessories -> Command Prompt.
  • Password: Use the Class Password or whatever you set it.
  • Click on the radio button "Bridged: Connected directly to the physical network".
  • This is the Victim Machine that we will be scanning with BackTrack5R1.
  • Login to Damn Vulnerable WXP-SP2 (Victim Machine)
  • Navigate to where the BackTrack5R1 VM is located.
  • how to use nessus backtrack 5

  • Scan Damn Vulnerable WXP-SP2 with Nessus.
  • how to use nessus backtrack 5

  • NESSUS: Lesson 2: Install Nessus on BackTrack 5.
  • BackTrack: Lesson 1: Installing BackTrack 5.
  • Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture.
  • Tenable Network Security provides enterprise-class solutions for continuous monitoring and visibility of vulnerabilities, configurations, user activity and system events that impact security and compliance.







  • How to use nessus backtrack 5