Hey Folks, in this tutorial we will show you the whole process of installing and configuring a network scanning tool called βNexposeβ. Nexpose identifies the active services, open ports, and running applications on each machine, and it attempts to find vulnerabilities that may exist based on the attributes of the known services and applications. To get an in-depth knowledge about this tool, you can go here.
Letβs get to the point π !!
Nexus offers us a 14-day free trial to get to know about this tool much better but you have to register to grab this chance. Usually it supports domain or company email addresses, but you can also use temporary email.
https://www.rapid7.com/info/nexpose-trial/
After submitting the details we redirect to the download page from where we download the software for the linux operating system.
After a few minutes we received the product key at our temporary email address. Hold it tight π !!
Now we move the downloaded file to our compatible location, allow it executable and start the script.
chmod +x Rapid.bin ./Rapid7.bin
Hmm π !! As soon as we start the script, the GUI interface opens in the kali linux machine. We click on next to proceed.
Everything is already set as it should be, so we need to move forward again.
If you want to provide a proxy then it is up to you but in our case we will move forward.
We need to keep the username and password to protect the admin console.
We click on βInitialize and start after installationβ and proceed.
Good π !! The final link is given by the tool that we open on our default Firefox browser.
Hmm π !! When we open the given URL on the browser, we get some certificate problem on there. To deal with this problem, we accept the warning and move towards the tool.
Great π !! Finally we have reached our last stop. Here we enter the credentials we had previously created and moved forward.
Now here we have to submit the product key which we got earlier by this tool at our email address.
Amazing π !! Everything is set up and now we can enjoy this tool and scan the entire infrastructure (hosts) of any network.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.
View Comments
Hii
hi
Currently it looks like BlogEngine is the top blogging platform out there right now.
(from what I've read) Is that what you are using on your blog?
Great blog you have here but I was curious about if you knew of
any message boards that cover the same topics talked about here?
I'd really like to be a part of community where I can get
suggestions from other knowledgeable individuals that share the same interest.
If you have any recommendations, please let me
know. Cheers!
thanks :) !!
Does your site have a contact page? I'm having a tough time locating it but, I'd like to send you
an email. I've got some ideas for your blog you might be interested in hearing.
Either way, great website and I look forward to seeing
it expand over time.