Basic commands
Import Scan Results
Db_import/path/file. Nessus
View existing IP information in the database
MSF > Db_hosts-c address,svcs,vulns (Note: VULNS is vulnerability vulnerability abbreviation)
Displays a list of detailed vulnerabilities
MSF > Db_vulns
The first step:
Connecting to a database
MSF > Db_connect postgres:[email protected] Database ip/msf3
Step Two:
Load Nessus
Step Three:
MSF > Nessus_connect nessus Account: Password @ip: port (default = 8834)
MSF > Load
View Plugin Help
MSF > Nessus_help
As with the graphical interface, you need to specify an ID number for the scan policy that you have defined when you start the scan
List existing scan policies
MSF > Nessus_policy_list
Use a scan policy
MSF > Nessus_scan_new
View Current scan status
MSF > Nessus_scan_status
Scan ends List scan results
MSF > Nessus_report_list
Download the report and import the database
MSF > Nessus_report_get Report ID
Using the Nessus plugin command in Metasploit