Thursday, January 28, 2010

ITC 358 Ass02 _Task04

Nessus Vulnerability Scanner


Step 01
In order to download the program called Nessus following URL helps and can be done as shown in figure



Step 03
To register the software enter the detail as shown in figure



Step 05
To start the Nessus Derver configuration following displayed windows will be fruitful and the task can be operated as desired by the Admin.



Step 06

Nessus Client Software can be opearated for any host as shown in the figure.






Step 10

While Starting the Nessus Client Software for the host, the following message appears stated as shown in the figure below.


Step 13
To scan the Networks the IP range has to be provided , and has to be provided as shown in the figure below, which scans for the host in the network.



Step 15
Scanning the network is done as shown in the figure, which shows the host that are connected in the Network in the form of IP addresses.



Step 17
When the scan of the network is finished the detailed about protocols and services can be found in the left pane and and its details can be generated from the right pane as shown in the figure, while noting the Risk Factor of each item, the status shows as None  which means the system is under contorl and no vulenrable act has been in the particular protocol or  service of the particular host of the network.




The information that has been detailed by the following Nessus Vulnerability Scanner can be very useful to the anyone , where most of the details of the Network Activities are scanned and listed. By analysing all these information we can prevent the Network system from the Vulenerable attacks in order to run the Network system smoothly.

No comments:

Post a Comment