Penetration Tests With Nessus (Chapter 1) Nessus İle Sızma Testleri
Nessus Linux Installation
https://www.tenable.com/products/nessus/select-your-operating-system
I downloaded the debian package. Let's go to setup :)
dpkg -i Nessus-7.0.0-debian6_amd64.deb
We got the activation code after opening Tenable membership. I then connected with the 8834 port scanner and entered the necessary information
Meanwhile I downloaded the "metasploitable 2" virtual machine. Then started broadcasting with VirtualBox
FOr a short time IP Address for vulnerability researcher
Now right click on the new scan option
I will choose a simple network scan to be an example
after...
We enter the target name and ip address 212.83.175.136
This part asks if you want to do the scanning at the widespread ports or not
This section asks how to perform a scan on the web application.
We started scanning
Continues to scan I will have a coffee :) Nessus gives more healthier result than its competitors.
I am using nessus with remote server because I do not have to wait for slow scans
Many security vulnerabilities have been achieved.
In the second part we will explain how to exploit these vulnerabilities.
Thank you for reading.
E-Mail for your questions berkdusunurx@gmail.com