SlideShare a Scribd company logo
4
Most read
5
Most read
7
Most read
vulnerability scanner
We are going to talk about …
 History & Background of Nessus
 Hardware Requirement & Installation Procedure
 Features Available in Nessus
 Functionalities Nessus Provides &
 Conclude summarizing What did we Learn
So lets begin !
History
o The “Nessus” Project was started by Renaud Deraison in 1998
o 5th October 2005 – Tenable Network Security changes Nessus 3 to a proprietary license and
makes it closed source.
o July 2008 – home users get full access to plugin feeds with a non commercial license.
o Nessus 4 released onApril 9, 2009. Nessus 5 released on February 15, 2012.
o The Nessus 2 engine and some of the plugins are still under GPL license which lead to forked
open source projects based on Nessus: OpenVAS, Porz-Wahn.
Background
The “Nessus” Project is of a free and open source remote security scanner. It is vulnerability
scanner which allow you to detect vulnerability in your system. It is very popular vulnerability
scanner which support Windows , Linux and Mac operating system etc. Nessus uses web
interface to install , scan and report the various vulnerabilities. It identifies vulnerabilities that
allow remote attacker to access sensitive information rom the system.
Hardware Requirements
 Nessus managing up to 50,000 hosts
 CPU: 1 dual-core 2 GHz
 CPU Memory: 2 GB RAM (4 GB RAM recommended)
 Disk space: 30 GB
 Nessus managing more than 50,000 hosts
 CPU: 1 dual-core 2 GHz CPU (2 dual-core recommended)
 Memory: 2 GB RAM (8 GB RAM recommended)
 Disk space: 30 GB (Additional space may be needed)
Installation Procedure
 You can download it from https://www.tenable.com/products/nessus/nessus- professional
 Once you download it then register https://www.tenable.com/products/nessus/activation-code
 Then install the tool.
 Open the Nessus in the browser http://localhost:8834/WelcomeToNessus- Install/welcome
 Create an account and then fill the activation code.
 Then downloads the necessary plugins.
 After completion of installation you redirect to the login page and put your credential their.
Features
 NASL – the Nessus Attack Scripting Language, a language designed specifically to write security tests easily and
quickly Up-to-date SecurityVulnerability
 Database – focuses on the development of security checks for newly disclosed vulnerabilities Tests Multiple Hosts
Simultaneously Smart
 Service Recognition – Nessus does not expect the target hosts to respect IANA assigned port numbers
 Multiple Services – if two or more web servers run on the same host, on different ports, Nessus will identify and test
all of them.
 Plugin Cooperation – no unnecessary checks are performed. If a FTP server does not offer anonymous logins, then
anonymous login related security checks will not be performed.
 Complete Reports – detects security vulnerabilities and the risk level of each (Info, Low, Medium, High, and
Critical), and also offers solutions.
 Full SSL Support – tests services offered over SSL such as HTTPS, SMTPS, IMAPS.
 Smart Plugins (optional) – ”optimization” option that will determine which plugins should or should not be
launched against the remote host.
 Non-Destructive (optional) – Certain checks can be detrimental to specific network services. For avoiding a service
failure, enable the ”safe checks” option, which will tell Nessus not to exploit real flaws to determine if a
vulnerability is present.
Functionalities
Web Application Test:
Web testing, or web application test, is a software practice that ensures quality by testing that the
functionality of a given web application is working as intended or as per the requirements. Web testing
allows you to find bugs at any given time, prior to a release, or on a day-to-day basis.
Discovering Hosts:
Host discovery is one of the earliest phases of network reconnaissance. The adversary usually starts with
a range of IP addresses belonging to a target network and uses various methods to determine if an host
is present at that IP address. Host discovery is usually referred to as 'Ping' scanning using a sonar analogy.
Basic Network Scan:
Network scanning helps to detect all the active hosts on a network and maps them to their IP addresses.
Network scanners send a packet or ping to every possible IP address and wait for a response to determine
the status of the applications or host devices. The responding hosts are considered active, while others are
considered dead or inactive.These responses are then scanned to detect inconsistencies.
Active Directory Starter Scan:
When Microsoft released the first version of Active Directory, an option was added to enable compatibility
with older systems, which allows unauthenticated users to read all the configuration data in the domain. An
attacker can use this feature to discover targets or carry out brute-force attacks. The Active Directory
Starter Scan is meant to be used for preliminary analysis of AD hosts.
List
of
Other
Functionalities
that
Nessus
provides:
Template Description
Discovery
Host Discovery Performs a simple scan to discover live hosts and open ports.
Vulnerabilities
Advanced Dynamic Scan An advanced scan without any recommendations, where you can
configure dynamic plugin filters instead of manually selecting plugin
families or individual plugins. As Tenable, Inc. releases new plugins, any
plugins that match your filters are automatically added to the scan or
policy. This allows you to tailor your scans for specific vulnerabilities
while ensuring that the scan stays up to date as new plugins are
released. See Configure Dynamic Plugins.
Advanced Scan A scan without any recommendations, so that you can fully customize
the scan settings.
Basic Network Scan Performs a full system scan that is suitable for any host. For example,
you could use this template to perform an internal vulnerability scan on
your organization's systems.
Badlock Detection Performs remote and local checks for CVE-2016-2118 and CVE-2016-
0128.
Bash Shellshock Detection Performs remote and local checks for CVE-2014-6271 and CVE-2014-
7169.
Credentialed Patch Audit Authenticates hosts and enumerates missing updates.
DROWN Detection Performs remote checks for CVE-2016-0800.
Intel AMT Security Bypass Performs remote and local checks for CVE-2017-5689.
Malware Scan Scans for malware on Windows and Unix systems.
Note: See the Application, Malware, and Content Audits video and
the Application, Malicious Software, and Content Audits video for more
information about scanning for malware.
Mobile Device Scan Assesses mobile devices via Microsoft Exchange or an MDM.
PrintNightmare Performs local checks for CVE-2021-34527, the PrintNightmare
Windows Print Spooler vulnerability.
Shadow Brokers Scan Scans for vulnerabilities disclosed in the Shadow Brokers leaks.
Spectre and Meltdown Performs remote and local checks for CVE-2017-5753, CVE-2017-5715,
and CVE-2017-5754.
WannaCry Ransomware Scans for the WannaCry ransomware.
Ripple20 Remote Scan Detects hosts running the Treck stack in the network, which may be
affected by Ripple20 vulnerabilities.
Zerologon Remote Scan Detects Microsoft Netlogon elevation of privilege vulnerability
(Zerologon).
Solorigate Detects SolarWinds Solorigate vulnerabilities using remote and local
checks.
Web Application Tests Scan for published and unknown web vulnerabilities.
Active Directory Starter Scan Scans for misconfigurations in Active Directory.
Compliance
Audit Cloud Infrastructure Audits the configuration of third-party cloud services.
Internal PCI Network Scan Performs an internal PCI DSS (11.2.1) vulnerability scan.
For more information, see Unofficial PCI ASV Validation Scan.
MDM Config Audit Audits the configuration of mobile device managers.
Offline Config Audit Audits the configuration of network devices.
PCI Quarterly External Scan Performs quarterly external scans as required by PCI.
Performs quarterly external scans as required by PCI.
For more information, see Unofficial PCI ASV Validation Scan.
Policy Compliance Auditing Audits system configurations against a known baseline.
SCAP and OVAL Auditing Audits systems using SCAP and OVAL definitions.
*https://docs.tenable.com/nessus/Content/ScanAndPolicyTemplates.htm
Conclusion
Nessus is a remote security scanning tool, which scans a computer and raises an alert if it
discovers any vulnerabilities that malicious hackers could use to gain access to any computer
you have connected to a network. It does this by running multiple checks on a given computer,
testing to see if any of these attacks could be used to break into the computer or otherwise
harm it.
Nessus comes with a lot of advantages like: Free for non-commercial use; Available on
multiple operating systems (Windows, Mac OS, various distributions of Linux); Advanced scans
for networks, websites, operating systems, mobile devices. By default Nessus does “Safe
Checks” which ensure that there won't be any adverse effects on the system or network.
Aggressive and in-deep checks (e.g. DoS attacks) can be enabled at user’s will. Does Good for
Security Audits & can Scan multiple hosts on the same scan.
On the other hand Nessus is Hard to configure for beginners. The free non-commercial license
is limited to up to 16 IP addresses that must be within the same household & has limited
support for Ubuntu, Fedora Core, FreeBSD, Debian.
This was presented by:
Archit Jain [20BCAR0250]
Aryan Samsukha [20BCAR0225]
Suman Garai [20BCAR0246]
Utsav [20BCAR0265]
Thank You &
Have a Nice Day
🙂
20210906-Nessus-FundamentalInfoSec.ppsx

More Related Content

PPTX
Demo of security tool nessus - Network vulnerablity scanner
PPTX
Nessus-Vulnerability Tester
PDF
Nessus Software
PDF
Implementing Vulnerability Management
PDF
What is Penetration & Penetration test ?
PDF
Tenable Solutions for Enterprise Cloud Security
PDF
Testing concepts [3] - Software Testing Techniques (CIS640)
PPS
Security testing
Demo of security tool nessus - Network vulnerablity scanner
Nessus-Vulnerability Tester
Nessus Software
Implementing Vulnerability Management
What is Penetration & Penetration test ?
Tenable Solutions for Enterprise Cloud Security
Testing concepts [3] - Software Testing Techniques (CIS640)
Security testing

What's hot (20)

PDF
IBM Qradar
PDF
Penetration testing & Ethical Hacking
PPTX
Patch Management Best Practices
PDF
Requirements Based Testing
PDF
Super Easy Memory Forensics
 
PPTX
Malware Static Analysis
PPT
TESTING STRATEGY.ppt
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PDF
Shift Left Security - The What, Why and How
PDF
Security testing presentation
PDF
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
PDF
CISSP Prep: Ch 8. Security Operations
ODP
Scanning with nmap
PPTX
OpenVAS
PPT
Testing fundamentals
PDF
Non-Functional testing
PPTX
Predict Software Reliability Before the Code is Written
PDF
Pentest with Metasploit
PDF
Vulnerability Management Program
IBM Qradar
Penetration testing & Ethical Hacking
Patch Management Best Practices
Requirements Based Testing
Super Easy Memory Forensics
 
Malware Static Analysis
TESTING STRATEGY.ppt
Introduction to NIST’s Risk Management Framework (RMF)
Shift Left Security - The What, Why and How
Security testing presentation
DevOps Testing | Continuous Testing In DevOps | DevOps Tutorial | DevOps Trai...
CISSP Prep: Ch 8. Security Operations
Scanning with nmap
OpenVAS
Testing fundamentals
Non-Functional testing
Predict Software Reliability Before the Code is Written
Pentest with Metasploit
Vulnerability Management Program
Ad

Similar to 20210906-Nessus-FundamentalInfoSec.ppsx (20)

PDF
Nessus is a network security toolIn a pragraph describe how it is .pdf
PDF
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
PPTX
PDF
website vulnerability scanner and reporter research paper
PPTX
Finalppt metasploit
PDF
Types of Vulnerability Scanning An in depth investigation.pdf
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
PDF
Network Security Tools
PDF
5 howtomitigate
DOCX
unit 2 Intoduction to Tools and Platforms.docx
DOCX
Security Handbook
DOC
Top 10 Web Vulnerability Scanners
PPSX
Security measures for networking
PDF
Vulnerability Assessment Report
PDF
Network Vulnerabilities And Cyber Kill Chain Essay
PPTX
Network Security Nmap N Nessus
PPTX
Introduction Vulnerability assessment and penetration testing.pptx
PPTX
Cryptography and system security
PPTX
Introduction to penetration testing
Nessus is a network security toolIn a pragraph describe how it is .pdf
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
website vulnerability scanner and reporter research paper
Finalppt metasploit
Types of Vulnerability Scanning An in depth investigation.pdf
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Network Security Tools
5 howtomitigate
unit 2 Intoduction to Tools and Platforms.docx
Security Handbook
Top 10 Web Vulnerability Scanners
Security measures for networking
Vulnerability Assessment Report
Network Vulnerabilities And Cyber Kill Chain Essay
Network Security Nmap N Nessus
Introduction Vulnerability assessment and penetration testing.pptx
Cryptography and system security
Introduction to penetration testing
Ad

More from Suman Garai (13)

PDF
mastersDegree-finalYearProject-ClinicalGPT
PDF
Hidden in Plain Sight: Securing Digital Secrets with Image Steganography
PDF
20230513-reconFTW-CyberSapiens.pdf
PDF
20230324-Exploring the Landscape of Password Managers for Individual Users a...
PDF
20230105-TestCases&Oracle-MobileTesting.pdf
PDF
20221003-DigitalForensicTools-DigitalForensicInvestigation.pdf
PPTX
20220911-ISO27000-SecurityStandards.pptx
PPTX
20220819-Ecosystem-EnviornmentalScience.pptx
PPTX
20220816-GeolocationAPI-AdvancedWebDevelopment.pptx
PPTX
20220728-iOSAppDev-MobileAppDev.pptx
PPSX
20210727-Technoprenuership-EntreprenuershipDev.ppsx
PPTX
20210717-AntiBotnets-FundamentalInfoSec.pptx
PPTX
20210417-cppRelevancy-DataStructures.pptx
mastersDegree-finalYearProject-ClinicalGPT
Hidden in Plain Sight: Securing Digital Secrets with Image Steganography
20230513-reconFTW-CyberSapiens.pdf
20230324-Exploring the Landscape of Password Managers for Individual Users a...
20230105-TestCases&Oracle-MobileTesting.pdf
20221003-DigitalForensicTools-DigitalForensicInvestigation.pdf
20220911-ISO27000-SecurityStandards.pptx
20220819-Ecosystem-EnviornmentalScience.pptx
20220816-GeolocationAPI-AdvancedWebDevelopment.pptx
20220728-iOSAppDev-MobileAppDev.pptx
20210727-Technoprenuership-EntreprenuershipDev.ppsx
20210717-AntiBotnets-FundamentalInfoSec.pptx
20210417-cppRelevancy-DataStructures.pptx

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
A Presentation on Artificial Intelligence
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
A comparative analysis of optical character recognition models for extracting...
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Machine Learning_overview_presentation.pptx
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A Presentation on Artificial Intelligence

20210906-Nessus-FundamentalInfoSec.ppsx

  • 2. We are going to talk about …  History & Background of Nessus  Hardware Requirement & Installation Procedure  Features Available in Nessus  Functionalities Nessus Provides &  Conclude summarizing What did we Learn So lets begin !
  • 3. History o The “Nessus” Project was started by Renaud Deraison in 1998 o 5th October 2005 – Tenable Network Security changes Nessus 3 to a proprietary license and makes it closed source. o July 2008 – home users get full access to plugin feeds with a non commercial license. o Nessus 4 released onApril 9, 2009. Nessus 5 released on February 15, 2012. o The Nessus 2 engine and some of the plugins are still under GPL license which lead to forked open source projects based on Nessus: OpenVAS, Porz-Wahn. Background The “Nessus” Project is of a free and open source remote security scanner. It is vulnerability scanner which allow you to detect vulnerability in your system. It is very popular vulnerability scanner which support Windows , Linux and Mac operating system etc. Nessus uses web interface to install , scan and report the various vulnerabilities. It identifies vulnerabilities that allow remote attacker to access sensitive information rom the system.
  • 4. Hardware Requirements  Nessus managing up to 50,000 hosts  CPU: 1 dual-core 2 GHz  CPU Memory: 2 GB RAM (4 GB RAM recommended)  Disk space: 30 GB  Nessus managing more than 50,000 hosts  CPU: 1 dual-core 2 GHz CPU (2 dual-core recommended)  Memory: 2 GB RAM (8 GB RAM recommended)  Disk space: 30 GB (Additional space may be needed) Installation Procedure  You can download it from https://www.tenable.com/products/nessus/nessus- professional  Once you download it then register https://www.tenable.com/products/nessus/activation-code  Then install the tool.  Open the Nessus in the browser http://localhost:8834/WelcomeToNessus- Install/welcome  Create an account and then fill the activation code.  Then downloads the necessary plugins.  After completion of installation you redirect to the login page and put your credential their.
  • 5. Features  NASL – the Nessus Attack Scripting Language, a language designed specifically to write security tests easily and quickly Up-to-date SecurityVulnerability  Database – focuses on the development of security checks for newly disclosed vulnerabilities Tests Multiple Hosts Simultaneously Smart  Service Recognition – Nessus does not expect the target hosts to respect IANA assigned port numbers  Multiple Services – if two or more web servers run on the same host, on different ports, Nessus will identify and test all of them.  Plugin Cooperation – no unnecessary checks are performed. If a FTP server does not offer anonymous logins, then anonymous login related security checks will not be performed.  Complete Reports – detects security vulnerabilities and the risk level of each (Info, Low, Medium, High, and Critical), and also offers solutions.  Full SSL Support – tests services offered over SSL such as HTTPS, SMTPS, IMAPS.  Smart Plugins (optional) – ”optimization” option that will determine which plugins should or should not be launched against the remote host.  Non-Destructive (optional) – Certain checks can be detrimental to specific network services. For avoiding a service failure, enable the ”safe checks” option, which will tell Nessus not to exploit real flaws to determine if a vulnerability is present.
  • 6. Functionalities Web Application Test: Web testing, or web application test, is a software practice that ensures quality by testing that the functionality of a given web application is working as intended or as per the requirements. Web testing allows you to find bugs at any given time, prior to a release, or on a day-to-day basis.
  • 7. Discovering Hosts: Host discovery is one of the earliest phases of network reconnaissance. The adversary usually starts with a range of IP addresses belonging to a target network and uses various methods to determine if an host is present at that IP address. Host discovery is usually referred to as 'Ping' scanning using a sonar analogy.
  • 8. Basic Network Scan: Network scanning helps to detect all the active hosts on a network and maps them to their IP addresses. Network scanners send a packet or ping to every possible IP address and wait for a response to determine the status of the applications or host devices. The responding hosts are considered active, while others are considered dead or inactive.These responses are then scanned to detect inconsistencies.
  • 9. Active Directory Starter Scan: When Microsoft released the first version of Active Directory, an option was added to enable compatibility with older systems, which allows unauthenticated users to read all the configuration data in the domain. An attacker can use this feature to discover targets or carry out brute-force attacks. The Active Directory Starter Scan is meant to be used for preliminary analysis of AD hosts.
  • 10. List of Other Functionalities that Nessus provides: Template Description Discovery Host Discovery Performs a simple scan to discover live hosts and open ports. Vulnerabilities Advanced Dynamic Scan An advanced scan without any recommendations, where you can configure dynamic plugin filters instead of manually selecting plugin families or individual plugins. As Tenable, Inc. releases new plugins, any plugins that match your filters are automatically added to the scan or policy. This allows you to tailor your scans for specific vulnerabilities while ensuring that the scan stays up to date as new plugins are released. See Configure Dynamic Plugins. Advanced Scan A scan without any recommendations, so that you can fully customize the scan settings. Basic Network Scan Performs a full system scan that is suitable for any host. For example, you could use this template to perform an internal vulnerability scan on your organization's systems. Badlock Detection Performs remote and local checks for CVE-2016-2118 and CVE-2016- 0128. Bash Shellshock Detection Performs remote and local checks for CVE-2014-6271 and CVE-2014- 7169. Credentialed Patch Audit Authenticates hosts and enumerates missing updates. DROWN Detection Performs remote checks for CVE-2016-0800. Intel AMT Security Bypass Performs remote and local checks for CVE-2017-5689. Malware Scan Scans for malware on Windows and Unix systems. Note: See the Application, Malware, and Content Audits video and the Application, Malicious Software, and Content Audits video for more information about scanning for malware. Mobile Device Scan Assesses mobile devices via Microsoft Exchange or an MDM. PrintNightmare Performs local checks for CVE-2021-34527, the PrintNightmare Windows Print Spooler vulnerability. Shadow Brokers Scan Scans for vulnerabilities disclosed in the Shadow Brokers leaks. Spectre and Meltdown Performs remote and local checks for CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754. WannaCry Ransomware Scans for the WannaCry ransomware. Ripple20 Remote Scan Detects hosts running the Treck stack in the network, which may be affected by Ripple20 vulnerabilities. Zerologon Remote Scan Detects Microsoft Netlogon elevation of privilege vulnerability (Zerologon). Solorigate Detects SolarWinds Solorigate vulnerabilities using remote and local checks. Web Application Tests Scan for published and unknown web vulnerabilities. Active Directory Starter Scan Scans for misconfigurations in Active Directory. Compliance Audit Cloud Infrastructure Audits the configuration of third-party cloud services. Internal PCI Network Scan Performs an internal PCI DSS (11.2.1) vulnerability scan. For more information, see Unofficial PCI ASV Validation Scan. MDM Config Audit Audits the configuration of mobile device managers. Offline Config Audit Audits the configuration of network devices. PCI Quarterly External Scan Performs quarterly external scans as required by PCI. Performs quarterly external scans as required by PCI. For more information, see Unofficial PCI ASV Validation Scan. Policy Compliance Auditing Audits system configurations against a known baseline. SCAP and OVAL Auditing Audits systems using SCAP and OVAL definitions. *https://docs.tenable.com/nessus/Content/ScanAndPolicyTemplates.htm
  • 11. Conclusion Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network. It does this by running multiple checks on a given computer, testing to see if any of these attacks could be used to break into the computer or otherwise harm it. Nessus comes with a lot of advantages like: Free for non-commercial use; Available on multiple operating systems (Windows, Mac OS, various distributions of Linux); Advanced scans for networks, websites, operating systems, mobile devices. By default Nessus does “Safe Checks” which ensure that there won't be any adverse effects on the system or network. Aggressive and in-deep checks (e.g. DoS attacks) can be enabled at user’s will. Does Good for Security Audits & can Scan multiple hosts on the same scan. On the other hand Nessus is Hard to configure for beginners. The free non-commercial license is limited to up to 16 IP addresses that must be within the same household & has limited support for Ubuntu, Fedora Core, FreeBSD, Debian.
  • 12. This was presented by: Archit Jain [20BCAR0250] Aryan Samsukha [20BCAR0225] Suman Garai [20BCAR0246] Utsav [20BCAR0265] Thank You & Have a Nice Day 🙂