Detailed deployment of Nessus

Source: Internet
Author: User

1. Overview of Nessus

Nessus is considered to be the most widely used system vulnerability scanning and analysis software in the world. In total, more than 75,000 organizations use Nessus as software to scan their computer systems.

* Provides a complete computer vulnerability scan service and updates its Vulnerability Database at any time.

* Unlike traditional vulnerability scanning software, Nessus can simultaneously perform system vulnerability analysis and scanning by shaking control on the local or remote end.

* The operating efficiency can be adjusted based on system resources. If you add more resources to the host (such as accelerating the CPU speed or increasing the memory size), the efficiency of the host can be improved because of the abundant resources.

* You can customize the plug-in (plug-in)

* NASL (Nessus attack scripting language) is a language developed by tenable and used to write security test options for Nessus.

* SSL (Secure Socket Layer) is fully supported ).

* It has been around for ten years since its development in 1998, so it is a well-developed software.

Using the customer/server architecture, the client provides a graphical interface running in X Window to receive user commands and communicate with the server,

Send a user's scan request to the server. The server starts the scan and presents the scan result to the user. The scan code and vulnerability data are independent of each other,

Nessus has a corresponding plug-in for each vulnerability. The vulnerability plug-in is a short piece of attack simulation vulnerability code written by NASL (Nessus attack scripting language,

This vulnerability plug-in scanning technology greatly facilitates the maintenance and update of vulnerability data. Nessus has the ability to scan any port for any service;

Generate detailed output reports in the format specified by the user (ASCII text, HTML, etc.), including the target's vulnerabilities, how to fix vulnerabilities to prevent hacker intrusion and risk levels.



2. Nessus software usage demonstration


-- Watch Youku demonstration




3. Deployment of Nessus


1) install software

# Rpm-IVH Nessus-4.4.1-es5.i386.rpm

# Vim ~ /. Bash_profile

Export Path =/opt/Nessus/sbin:/opt/Nessus/bin: $ path

Export manpath =/opt/Nessus/MAN: 'manpath'

# Source ~ /. Bash_profile


Composition of Nessus software:

# Ll/opt/Nessus/

Drwxr-XR-x 2 root Root 4096 Jan 8 bin -- commands used by common users

Drwxr-XR-x 3 Root 4096 Jan 8 com -- root certificate

Drwxr-XR-x 3 Root 4096 Jan 8 etc -- configuration file

Drwxr-XR-x 3 Root 4096 Jan 11 lib -- plug-in used for scanning

Drwxr-XR-x 4 Root 4096 Jan 8 00:47 man

Drwxr-XR-x 2 root Root 4096 Jan 8 sbin

Drwxr-XR-x 3 Root 4096 Jan 8 var -- account/log/report/Web Page




2) Start Nessus and use the Web Client to access

# Service nessusd start

# Chkconfig nessusd on

# Netstat-tnlp | grep Nessus

TCP 0 0 0.0.0.0: 8834 0.0.0.0: * Listen 13908/nessusd -- Web Access Port

TCP 0 0 0.0.0.0: 1241 0.0.0.0: * Listen 13908/nessusd -- Port accessed by the Nessus Client

TCP 0 0: 1241: * Listen 13908/nessusd


3) Open the browser to access https: // localhost: 8834 and perform Initialization Configuration.


Before accessing the browser, you must install the flash plug-in on the client:

# Rpm-IVH flash-plugin-10.3.183.11-release.i386.rpm-restart the browser after installation


Application serial number

Http://www.tenable.com/products/nessus/nessus-plugins/obtain-an-activation-code

Register Nessus

Wait for Agent updates


4) operations on the Nessus Web Interface (first scan yourself and then scan other hosts ):

1) create a scan policy (define a scan policy/scan the target host using the account and password, etc)

2) scan the specified host (192.168.0.1 192.168.0.0/24)

3) view and export the report.

4) fix vulnerabilities



This article is from "O & M! Liberation !" Blog, declined to reprint!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.