• We just launched and are currently in beta. Join us as we build and grow the community.

Nexpose : Vulnerability Scanner Tool

kingyash1929

Toolchain Integrator
K Rep
0
0
0
Rep
0
K Vouches
0
0
0
Vouches
0
Posts
95
Likes
22
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 500 XP
Nexpose11.png


Hey Folks, in this tutorial we will show you the whole process of installing and configuring a network scanning tool called “Nexpose“. Nexpose identifies the active services, open ports, and running applications on each machine, and it attempts to find vulnerabilities that may exist based on the attributes of the known services and applications. To get an in-depth knowledge about this tool, you can go here.

Let’s get to the point 😛 !!

Registration

Nexus offers us a 14-day free trial to get to know about this tool much better but you have to register to grab this chance. Usually it supports domain or company email addresses, but you can also use temporary email.


1.png


After submitting the details we redirect to the download page from where we download the software for the linux operating system.

2.png


After a few minutes we received the product key at our temporary email address. Hold it tight 😛 !!

3.png


Now we move the downloaded file to our compatible location, allow it executable and start the script.

chmod +x Rapid.bin ./Rapid7.bin1chmod+xRapid.bin./Rapid7.bin

4.png


Hmm 😛 !! As soon as we start the script, the GUI interface opens in the kali linux machine. We click on next to proceed.

5.png


Everything is already set as it should be, so we need to move forward again.

6.png


If you want to provide a proxy then it is up to you but in our case we will move forward.

7.png

Setting Credentials

We need to keep the username and password to protect the admin console.

8.png


We click on “Initialize and start after installation” and proceed.

9.png


Good 😛 !! The final link is given by the tool that we open on our default Firefox browser.

10.png


Hmm 🙁 !! When we open the given URL on the browser, we get some certificate problem on there. To deal with this problem, we accept the warning and move towards the tool.

11.png


Great 😛 !! Finally we have reached our last stop. Here we enter the credentials we had previously created and moved forward.

12.png


Now here we have to submit the product key which we got earlier by this tool at our email address.

13.png


Amazing 😛 !! Everything is set up and now we can enjoy this tool and scan the entire infrastructure (hosts) of any network.

14.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

427,549

310,984

310,993

Top