![]() ![]() ![]() If you stuck with errors, Kali has a community forum that you can ask and request for helps. Done! – That’s it! Now I can use Nessus to conduct vulnerability scan to the Metasploitable box. Login into Nessus – Now, I can login into my Nessus by using the username and password that use during the registration process.ĩ. Download the newest plugins – At this point, Nessus will start download the latest plugins from Tenable server. I just copy and paste the Activation Code into the field above.ħ. The Activation Code will be send to my email. I choose “Nessus Home” option because I will use Nessus play around with Metasploitable 2. To get the code, I can request it from here, Obtain an Activation Code. Register plugin feed – I need to get the Activation Code. This user will have full control on Nessus.Ħ. Initial Account Setup – Next, I create an admin user for Nessus. ![]() Navigate to Nessus page – Open Iceweasel (Kali’s default web browser) and go to this address, Must use HTTPS connection.ĥ. Run Nessus service – Next, I run Nessus service by typing this command in the Terminal.Ĥ. I’m using 64-bit so my installation file is Nessus-x.x.x-debian6_b, where ‘x’ is the version number.ģ. ![]() Install Nessus – Once the download is finished, run this command to install Nessus. Choose Linux, Debian 32-bit or Debian 64-bit.Ģ. Download Nessus – Go to Tenable website and download Nessus software. So to use Nessus, I have to install it manually.įor more info about Kali, you can refer to their website here: ġ. Although it is a pentest distro, but Kali does not include with Nessus. Kali Linux (or Kali) is a penetration testing distro created by the developers of BackTrack. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |