Thursday, January 28, 2010

Question 4

Procedure for using the NESSUS VULNERABILITY SCANNER


STEP 1


The URL http://nessus.org/download/ was opened and the latest version of nessus was downloaded. (Textbook, Network Security, pg.328)


STEP 3

The required fields were filled in order to get the activation code for home use. Then the software was installed on the PC using the default settings. (Textbook, Network Security, pg.328)

STEP 5


Once the installation was completed, nessus server manager was launched and the default settings were configured and save and the program was terminated. (Textbook, Network Security, pg.328)

STEP 6

Then nessus client was launched.

STEP 10

On the main window, the connect button at the bottom of the window was clicked and local host was selected from the list of available nessus servers. Since this was the first time connection, a confirmation dialog appeared, Yes button was clicked to accept the certificate and proceed with login process. (Textbook, Network Security, pg.328)

STEP 13

After successful login to the localhost, the IP range to be scanned was entered by clicking on the plus(+) sign at the left bottom part of the window and save button was clicked. Then the default policy was selected for the scan and the changes were saved. Finally the scan button at the right bottom side of the window. (Textbook, Network Security, pg.328)

STEP 15

The scan process begins.

STEP 17



Since the scan was performed on a stand alone PC, the report is blank. Had it been connected to a network, the report would have shown the reports with desktop audits, servers and database with FDCC, PCI, CIS and other services.
References:
Tenable Network Security (n.d.). Download Nessus 4.2.0; retrieved on 10/02/2010; retrieved from http://www.nessus.org/download/
C.Mark(2009)Using the Nessus Vulnerability Scanner; retrieved on 10/02/2010; retrieved from Network Security Fundamentals

No comments:

Post a Comment