Difference between revisions of "Nessus"
From Notes_Wiki
m |
m |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
[[Main Page|Home]] > [[CentOS]] > [[CentOS 6.x]] > [[Penetration testing tools]] > [[Nessus]] | |||
'''Updated [[CentOS 7.x nessus]] page has latest notes on nessus''' | '''Updated [[CentOS 7.x nessus]] page has latest notes on nessus''' | ||
Line 26: | Line 27: | ||
[[Main Page|Home]] > [[CentOS]] > [[CentOS 6.x]] > [[Penetration testing tools]] > [[Nessus]] |
Latest revision as of 15:13, 24 August 2022
Home > CentOS > CentOS 6.x > Penetration testing tools > Nessus
Updated CentOS 7.x nessus page has latest notes on nessus
Nessus
Nessus is very good and feature rich vulnerability scanner developed by Tenable security team. It allows one to scan number of hosts for vulnerablities and also gives suggestions on how they can be fixed.
Installation
- Download nessus from http://www.tenable.com/products/nessus/select-your-operating-system
- You can download nessus manual from http://www.tenable.com/products/nessus/documentation
- Install nessus using 'rpm -ivh nessus*.rpm' command.
- Visit http://www.nessus.org/register/ to regsiter for activation code
- Use '/opt/nessus/bin/nessus-fetch --register <activation_key>' to register nessus
- Use '/opt/nessus//sbin/nessus-adduser' command and add a admin user with no rules.
- Use '/sbin/service nessusd start' to start nessusd service.
- Enable connection to port 8834 through firewall.
Basic usage
- Access nessus user interface using https://<IP>:8834/ Flash is required for nessus UI to work.
- Go to Policies tab and create a full scan policy with unsafe checks
- Go to Scan tab and schedule scan for test vm based on created policy.
- Go to Reports section and see scan report.
Home > CentOS > CentOS 6.x > Penetration testing tools > Nessus