Nessus vulnerability, Computer Network Security

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. So the Nmap scan shows that the WinXP system has IP address 192.168.58.133.

Next, I used the Nessus vulnerability scanner to scan WinXP for vulnerabilities. First, I started the Nessus server; by left clicking on its icon and then on the Start Nessus Server box. The Nessus server opened port 8834 and wait for a connection; sometimes it may take the server a couple of minutes to open this port. Then, I started my browser, connected to https://localhost:8834, and provided my username and password. The first time, my system did not recognize the certificate of Nessus and generated a warning message. I ignored it and accepted the certificate. If you use Bt5, check steps 6,7,8,9,10 of Nessus-Bt5 URL; of the Project URL. At the top of the Nessus window there are three tabs: Reports, Scans, Policies. I left-clicked on Policies, and then on +Add. The Add Policy window opened that enables defining a scanning policy. That is, which hosts and ports should be scanned as well as what vulnerabilities checks should be conducted. Nessus provides a lot of flexibility in specifying what Nessus must do. I used the default Nessus policy which is also very effective. So in the Name box, I simply typed Karvelas and in the Description box I typed "WinXP-SP2 Vulnerability Analysis". Then, I clicked on Next at the bottom right corner of the Nessus window. The next screenshot shows the Nessus settings. Note that if you use the Nessus of BT5, then in order to see (and click) Next, you must first expand the VMware Player to occupy all the screen of your host operating system. You can do this by left-clicking on the box at the right corner of the top bar of the VMware player which is located above the date and time.

Posted Date: 4/15/2013 3:20:12 AM | Location : United States







Related Discussions:- Nessus vulnerability, Assignment Help, Ask Question on Nessus vulnerability, Get Answer, Expert's Help, Nessus vulnerability Discussions

Write discussion on Nessus vulnerability
Your posts are moderated
Related Questions
Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

what is guided media or unguided media

Discuss how developers should apply the following countermeasures to improve the security of their code:

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

WHY USE AN IDS? IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

Limitations of firewall Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls ar

LOCAL TALK Apple discovered the LAN technology that uses bus topology. Its interface is added with all Macintosh computers. It has very low speed i.e. 230.4Kbps. Also it is ch