Sponsored
Vulnerability Scanner

Nessus Vulnerability Scanner Tool Installation

Hey Folks, in this tutorial we are going to configure a prominent vulnerability assessment tool called β€œNessusβ€œ. Nessus is a remote security scanning tool, which scans a computer, web application and if it detect any vulnerability, it raises the alerts. Nessus provides additional functionality beyond testing for known network vulnerabilities. For instance, it can use Windows credentials to examine patch levels on computers running the Windows operating system.

Let’s take a look πŸ˜› !!

Download Software

Definitely, this tool will not spend your bandwidth much because we will install it through the deb file. Download deb file for linux but according to the architecture. Keep in mind, it does not depend which OS you are using because you can configure this software in any debian system using the following command.

Once you have downloaded the deb file, place it to your favorable directory, give the executable permissions and install the Nessus.deb file using the dpkg command. Once all steps are completed, start the service.

chmod 777 Nessus.deb dpkg -i Nessus.deb
/bin/systemctl start nessusd.service

Ready πŸ˜› !! When we open the following URL on our default Firefox browser, we get some certificate warning πŸ™ !! But at this time we have to accept this warning to use the nessus tool.

https://localhost:8834

Great πŸ˜› !! Finally we have reached the web interface of this tool. Now we select β€œNessus Essentials” option and proceed.

Now here we enter some necessary personal details to verify ourselves.

Hmm πŸ˜› !! When we enter the email address, an activation code arrives at our provided email address which we need to submit here.

Now we need to provide unique username and password to secure the admin account.

Really πŸ˜› !! It will actually take some time to establish a connection or configure yourself.

HUREE πŸ˜› !! After the installation process is complete we again enter credentials to login to the admin account and finally we see the entire tool features.

After getting hold over this tool, you can easily make any changes in the account settings.

Wait πŸ˜› !! The article is not finished yet, as we will return soon with detailed features of this tool.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.