• We just launched and are currently in beta. Join us as we build and grow the community.

Nessus Vulnerability Scanner Tool Installation

riperdood

Blockchain Security Consultant
R Rep
0
0
0
Rep
0
R Vouches
0
0
0
Vouches
0
Posts
59
Likes
93
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Nessus-with-ease.png


Hey Folks, in this tutorial we are going to configure a prominent vulnerability assessment tool called “Nessus“. Nessus is a remote security scanning tool, which scans a computer, web application and if it detect any vulnerability, it raises the alerts. Nessus provides additional functionality beyond testing for known network vulnerabilities. For instance, it can use Windows credentials to examine patch levels on computers running the Windows operating system.

Let’s take a look 😛 !!

Download Software

Definitely, this tool will not spend your bandwidth much because we will install it through the deb file. Download deb file for linux but according to the architecture. Keep in mind, it does not depend which OS you are using because you can configure this software in any debian system using the following command.

1.png


Once you have downloaded the deb file, place it to your favorable directory, give the executable permissions and install the Nessus.deb file using the dpkg command. Once all steps are completed, start the service.

chmod 777 Nessus.deb dpkg -i Nessus.deb
/bin/systemctl start nessusd.service12chmod777Nessus.deb dpkg-iNessus.deb/bin/systemctl start nessusd.service

2.png


Ready 😛 !! When we open the following URL on our default Firefox browser, we get some certificate warning 🙁 !! But at this time we have to accept this warning to use the nessus tool.


3.png


Great 😛 !! Finally we have reached the web interface of this tool. Now we select “Nessus Essentials” option and proceed.

4.png


Now here we enter some necessary personal details to verify ourselves.

5.png


Hmm 😛 !! When we enter the email address, an activation code arrives at our provided email address which we need to submit here.

6.png


Now we need to provide unique username and password to secure the admin account.

7.png


Really 😛 !! It will actually take some time to establish a connection or configure yourself.

8.png


HUREE 😛 !! After the installation process is complete we again enter credentials to login to the admin account and finally we see the entire tool features.

9.png


After getting hold over this tool, you can easily make any changes in the account settings.

11.png


Wait 😛 !! The article is not finished yet, as we will return soon with detailed features of this tool.

About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

422,212

310,551

310,560

Top