Kali Linux Web Penetration Testing Video Tutorial- Eighth Lesson Nessus Wen / Xuan SoulVideo Course Address:http://edu.51cto.com/course/course_id-1887.htmlDirectoryNessusNessusinstallationNessusInitializeNessusApplication-Basic ConfigurationNessusApplication-Basic ConceptsNessusApplication-Basic StepsNessusApplication-ApplicationVideo Course Address:http://edu.51cto.com/course/course_id-1887.htmlPS: Readers interested in this article can addQQGroup:ha
I. Download, install and start NessusWebsite address: Http://www.tenable.com/products/nessus/select-your-operating-system#tosThe commercial version has a lifetime, so I chose to install it in a virtual machine and save it as a template.RPM-IVH nessus-6.7.0-es7.x86_64.rpmSystemctl Start Nessusd.serviceTwo. CENTOS7 Configuration Firewalld1) InstallationYum install-y firewalld Firewall-config2) configurationFi
Nessus is an excellent vulnerability scanning software, in its V6 home version of the online Update vulnerability plug-in is not successful, the use of offline update using the method provided by netizens is also not possible, so seriously studied the next, successfully updated the plugin, in this update method to share. 1. Get Challenge Code[Email protected]:~#/opt/nessus/sbin/nessuscli Fetch--challengeCh
Tags: local stat host NIS tar TCP policy Create promotionMSF > Load Nessus MSF > Nessus_connect fuckyou:[email Protected] Connect on Nessus MSF > Nessus_user_add Elevate the test user to admin[Email protected]:# nessus-adminLogin:xxxoooYest is isn't an administrative user. Does want to grant him admin rights? [y/n] YTest is now an administrator MSF > nessus_user
When you do not import cookies using Nessus to scan, the results of the scan is relatively simple, many deep problems can not be scanned out.
We need to manually import cookies, the results of a status scan with cookies will be more detailed and deeper, the following is the procedure:
In the Website login state, enter Document.cookie in the browser address bar to move the cursor to the beginning of the line manually enter javascript:The full
Vulnerability Scanning Tool1, OpenVAS
OpenVAS is an open vulnerability assessment system, or it can be said to be a network scanner with related tools. The OpenVAS is integrated by default on Kali. On Kali, the configuration is relatively simple "updated almost daily"
Example: http://www.cnblogs.com/youcanch/articles/5671242.html
Configuration OpenVAS: "Time is longer"
Installation Tutorial: http://www.hackingtutorials.org/scanning-tutorials/installing-openvas-kali-linu
1. Installation Registration(1) Click Https://www.tenable.com/products/nessus/select-your-operating-system to take the Windows operating system as an example)(2) then select 1. Get the activation code from the image content2. Choose according to your needs3. Registration screen Remember password user name last login4. The official website will send an activation code to your email address.5. Install into the official website homepage and select the ap
Basic commandsImport Scan ResultsDb_import/path/file. NessusView existing IP information in the databaseMSF > Db_hosts-c address,svcs,vulns (Note: VULNS is vulnerability vulnerability abbreviation)Displays a list of detailed vulnerabilitiesMSF > Db_vulnsThe first step:Connecting to a databaseMSF > Db_connect postgres:[email protected] Database ip/msf3Step Two:Load NessusStep Three:MSF > Nessus_connect nessus Account: Password @ip: port (default = 8834
Here are some simple free-to-share tools, technical support groups: 592132877, providing customized service development.GIF Motion Synthesis toolThe main function is to scan all the zip files in the specified folder, then extract the pictures in the zip file, and synthesize a GIF picture, save to the new path, support the time to set GIF, the demo effect is as follows:: GIF compositing toolFile Bulk Move ToolThe main function is to copy all the files in the specified folder and subfolders to the
Ncodegenerate is a razor syntax based on the. NET platform.CodeGenerate a tool.
Main features:
1. Use razor and C.
2. syntax highlighting prompt, which is automatically folded.
2. Enter a smart prompt. The @ model syntax smart prompt is supported.
3. The parameter model is directly customized using the C # class.
4. Supports multiple databases (currently MySQL, SQL Server, and Oracle), and supports expansion of write plug-ins.
5. Support
display.
System Repair:
What should I do if your system finds a lot of "acronyms" after the rkhunter statement? The method provided by this website can be taken into consideration:
Http://www.rootkit.nl/articles/rootkit_hunter_faq.html
Basically, the official website is the same as that of General Web administrators (
That is, when the second part of the previous partition was attacked), So it is best to re-install the security system directly. There is no illusion that rootkit or trojan pro
Blur tool, sharpen tool, smudge tool: RUse of the Blur tool: Reduce the contrast between pixels and reduce the contrast of the image.The sharpening tool, in contrast to the use of the Blur tool, enhances the contrast between pixel
Special character escape
Because WEB applications need to be federated to multiple languages, each containing some special characters, for dynamic or tabbed languages, a problem that we often encounter when we need to dynamically construct the content of a language is the escape of special characters. The following are some of the special character types that Web developers most frequently need to escape: HTML special characters; JavaScript special characters; SQL special characters;
If you do n
CodeSmith is one of the most widely used tools in code generation and has rich template resources and users. Many of my friends used CodeSmith and there are many ready-made templates. NCodeGenerate provides a template Conversion Tool from CodeSmith to NCodeGenerate. It makes it easier for users to switch from CodeSmith to NCodeGenerate. Next we will introduce it.
Open the tool menu> CodeSmith Conversion
Ncodegenerate asCodeGenerate tool. You can edit templates, check syntax, and execute template generation code. If there is no logical error in the template, there is no problem in the whole process. But who can ensure there is no error in the written template? Can you? I cannot.ProgramDevelopers know that code debugging takes much longer than code writing during development. Okay, ncodegenerate provides the debugging function. Today, we will briefly t
Compile tool (Compilers)
Compiler
Masm32 v8.2Masm32 v9.0
Learning w32asm programming uses masm32, because 99% of win32asm programmers use MASM. Http://www.movsd.com/
RadAsm 2.2.1.2
The Assembly editor requires masm32. this version provides good support for Chinese characters. Chinese: caocongEnglish to the official website download: http://www.radasm.com/
Auxiliary Tools
Apilist 1.01
Displays,
************* before you start HBase, make sure the ZK cluster is started ***************** The location of the Hmaster is not configured in the configuration file, and the result is which node starts HBase and which node is hmaster******* ****** HBase can start multiple hmaster by hbase-daemon.sh start Master, which is redundant standby status ****** To view the startup process:------------------------------------------------------------------------hmasterhregionserver---------------------- --
I sorted out a small tool class from Lao Zhao, a small tool class for testing, and a tool class from Lao Zhao.
I sorted out a test tool class from Lao Zhao without changing anything else. I just changed the class name and method name to a name that I prefer.
The Code is as follows:
/// /// Code performance tester/// Pu
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.