SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
‱ Nessus was founded by Renuad Deraison in the year 1998 to provide to the Internet
community a free remote security scanner.
‱It is vulnerability scanner which allow you to detect vulnerability in your system.
‱It is very popular vulnerability scanner which support Windows , Linux and Mac operating
system etc.
‱Nessus uses web interface to install , scan and report the various vulnerabilities.
‱It identifies vulnerabilities that allow remote attacker to access sensitive information rom
the system.
Hardware Requirement
Nessus managing up to 50,000 hosts
‱ CPU: 1 dual-core 2 GHz
‱ CPU Memory: 2 GB RAM (4 GB RAM recommended)
‱ Disk space: 30 GB
Nessus managing more than 50,000 hosts
‱ CPU: 1 dual-core 2 GHz CPU (2 dual-core recommended)
‱ Memory: 2 GB RAM (8 GB RAM recommended)
‱ Disk space: 30 GB (Additional space may be needed for reporting)
Download and Installation
‱ You can download it from https://www.tenable.com/products/nessus/nessus-
professional
‱ Once you download it then register
https://www.tenable.com/products/nessus/activation-code
‱ Then install the tool.
‱ Open the Nessus in the browser http://localhost:8834/WelcomeToNessus-
Install/welcome
‱ Create an account and then fill the activation code
‱ Then downloads the necessary plugins.
‱ After completion of installation you redirect to the login page and put your credential
their.
Policies
‱ Policies are nothing but the vulnerability test. There are 4 default policie.
1. External network scan
2. Internal network scan
3. Web App Tests
4. Prepare for PCI DSS (Payment Card Industry Data Security Standards)
‱ Create a new policy by clicking on New policy button:
Choose the type of scan that you want to perfom on your network.
Now I am selecting the basic network scan on my IP address for this you can give
whatever name you want and then give the little description and it is optional
Now go to the credential and then if you are using Linux or Mac OS choose Host otherwise
Windows for windows XP users and also fill the username and password by choosing
password in the authentication method
There are so many plug-in available in Nessus,click on save button to save your policy.
After saving the policy it automatically redirect to the page where you can see the newly
created policy by their name
Now you have successfully created the policy.
Now click on New Scan button and start the scanning process you can also create an folder
if you want and then perform the scan in that particular folder
Now choose the basic network scan to check all the vulnerability in our particular ip
address
Here give the name to your scan and add little bit description and add the folder.
In targets field you can give the one or more IP Addresses for scanning. And then click on
launch button to start scan.
You can see the status as running ,it will take some time because it is scanning all the
vulnerability in our network IP Address
Now you now see the pie chart and the go to the vulnerabilities section
It will show you all the available vulnerabilities present in my network and double click on
any vulnerability to see the description about it.
Nessus Software

More Related Content

PPTX
Nessus-Vulnerability Tester
PPTX
Bootable-USB.pptx
PDF
Cloud migration strategies
PDF
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
PPT
Security testing
PPTX
Threat Modeling And Analysis
PDF
Azure cloud migration simplified
 
PPTX
Information Security and the SDLC
Nessus-Vulnerability Tester
Bootable-USB.pptx
Cloud migration strategies
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Security testing
Threat Modeling And Analysis
Azure cloud migration simplified
 
Information Security and the SDLC

What's hot (20)

PPTX
Demo of security tool nessus - Network vulnerablity scanner
PDF
Nessus Basics
PPTX
Introduction To Exploitation & Metasploit
PPTX
Introduction to Malware Analysis
PPTX
Malware analysis
PPSX
20210906-Nessus-FundamentalInfoSec.ppsx
PPTX
Introduction to IDS & IPS - Part 1
PPTX
Introduction to penetration testing
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Metasploit
PPTX
Introduction to Snort
PPT
intrusion detection system (IDS)
PPT
Microsoft Operating System Vulnerabilities
PPTX
nessus
PPTX
VAPT PRESENTATION full.pptx
PPTX
Intrusion detection system
PDF
Penetration testing & Ethical Hacking
PDF
Network Security Fundamentals
PPTX
Application security
Demo of security tool nessus - Network vulnerablity scanner
Nessus Basics
Introduction To Exploitation & Metasploit
Introduction to Malware Analysis
Malware analysis
20210906-Nessus-FundamentalInfoSec.ppsx
Introduction to IDS & IPS - Part 1
Introduction to penetration testing
Intrusion Detection Systems and Intrusion Prevention Systems
Metasploit
Introduction to Snort
intrusion detection system (IDS)
Microsoft Operating System Vulnerabilities
nessus
VAPT PRESENTATION full.pptx
Intrusion detection system
Penetration testing & Ethical Hacking
Network Security Fundamentals
Application security
Ad

Similar to Nessus Software (20)

PDF
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
PDF
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
 
DOCX
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
PDF
snortinstallguide
PPT
Linux
PPTX
Drupal Continuous Integration with Jenkins - The Basics
PDF
PDF
Vulnerability Assessment Report
PDF
Documentation freenas
DOCX
Documentation free nas
PPT
Linux
PDF
Nessus is a network security tool- write a pragraph describe itsto.pdf
PPTX
( Ethical hacking tools ) Information grathring
PPT
Security & ethical hacking
PPTX
Client side exploits
PDF
Os Virtualization
PPTX
Finalppt metasploit
PPT
Cleaning Compromised Systems - January 2004
PPT
Aci dp
PDF
Operating systems and networks
NRPE - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core 4 and others.
Nrpe - Nagios Remote Plugin Executor. NRPE plugin for Nagios Core
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
snortinstallguide
Linux
Drupal Continuous Integration with Jenkins - The Basics
Vulnerability Assessment Report
Documentation freenas
Documentation free nas
Linux
Nessus is a network security tool- write a pragraph describe itsto.pdf
( Ethical hacking tools ) Information grathring
Security & ethical hacking
Client side exploits
Os Virtualization
Finalppt metasploit
Cleaning Compromised Systems - January 2004
Aci dp
Operating systems and networks
Ad

More from Megha Sahu (17)

PPTX
security misconfigurations
DOCX
AWS virtual private clould
PPTX
presentation
PPTX
kubernates and micro-services
PPTX
Aws
PPTX
Onelogin
PPTX
Justcloud
PPTX
single sign-on
PPTX
Splunk
PPTX
Nmap
PPTX
Encase Forensic
DOCX
Startup Theory
PPTX
Environmental Science
PPTX
LISTENING SKILLS
DOCX
Passport Automation System
DOCX
Case-Study Flipkart
PPTX
News Bytes
security misconfigurations
AWS virtual private clould
presentation
kubernates and micro-services
Aws
Onelogin
Justcloud
single sign-on
Splunk
Nmap
Encase Forensic
Startup Theory
Environmental Science
LISTENING SKILLS
Passport Automation System
Case-Study Flipkart
News Bytes

Recently uploaded (20)

PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
L1 - Introduction to python Backend.pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Online Work Permit System for Fast Permit Processing
PPTX
ai tools demonstartion for schools and inter college
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
AI in Product Development-omnex systems
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
history of c programming in notes for students .pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
 
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
Design an Analysis of Algorithms II-SECS-1021-03
L1 - Introduction to python Backend.pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Odoo POS Development Services by CandidRoot Solutions
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Operating system designcfffgfgggggggvggggggggg
Online Work Permit System for Fast Permit Processing
ai tools demonstartion for schools and inter college
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
AI in Product Development-omnex systems
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
top salesforce developer skills in 2025.pdf
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
How to Migrate SBCGlobal Email to Yahoo Easily
ManageIQ - Sprint 268 Review - Slide Deck
Internet Downloader Manager (IDM) Crack 6.42 Build 41
history of c programming in notes for students .pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
 
2025 Textile ERP Trends: SAP, Odoo & Oracle

Nessus Software

  • 1. ‱ Nessus was founded by Renuad Deraison in the year 1998 to provide to the Internet community a free remote security scanner. ‱It is vulnerability scanner which allow you to detect vulnerability in your system. ‱It is very popular vulnerability scanner which support Windows , Linux and Mac operating system etc. ‱Nessus uses web interface to install , scan and report the various vulnerabilities. ‱It identifies vulnerabilities that allow remote attacker to access sensitive information rom the system.
  • 2. Hardware Requirement Nessus managing up to 50,000 hosts ‱ CPU: 1 dual-core 2 GHz ‱ CPU Memory: 2 GB RAM (4 GB RAM recommended) ‱ Disk space: 30 GB Nessus managing more than 50,000 hosts ‱ CPU: 1 dual-core 2 GHz CPU (2 dual-core recommended) ‱ Memory: 2 GB RAM (8 GB RAM recommended) ‱ Disk space: 30 GB (Additional space may be needed for reporting)
  • 3. Download and Installation ‱ You can download it from https://www.tenable.com/products/nessus/nessus- professional ‱ Once you download it then register https://www.tenable.com/products/nessus/activation-code ‱ Then install the tool. ‱ Open the Nessus in the browser http://localhost:8834/WelcomeToNessus- Install/welcome ‱ Create an account and then fill the activation code ‱ Then downloads the necessary plugins. ‱ After completion of installation you redirect to the login page and put your credential their.
  • 4. Policies ‱ Policies are nothing but the vulnerability test. There are 4 default policie. 1. External network scan 2. Internal network scan 3. Web App Tests 4. Prepare for PCI DSS (Payment Card Industry Data Security Standards) ‱ Create a new policy by clicking on New policy button:
  • 5. Choose the type of scan that you want to perfom on your network.
  • 6. Now I am selecting the basic network scan on my IP address for this you can give whatever name you want and then give the little description and it is optional
  • 7. Now go to the credential and then if you are using Linux or Mac OS choose Host otherwise Windows for windows XP users and also fill the username and password by choosing password in the authentication method
  • 8. There are so many plug-in available in Nessus,click on save button to save your policy.
  • 9. After saving the policy it automatically redirect to the page where you can see the newly created policy by their name Now you have successfully created the policy.
  • 10. Now click on New Scan button and start the scanning process you can also create an folder if you want and then perform the scan in that particular folder Now choose the basic network scan to check all the vulnerability in our particular ip address
  • 11. Here give the name to your scan and add little bit description and add the folder. In targets field you can give the one or more IP Addresses for scanning. And then click on launch button to start scan.
  • 12. You can see the status as running ,it will take some time because it is scanning all the vulnerability in our network IP Address
  • 13. Now you now see the pie chart and the go to the vulnerabilities section
  • 14. It will show you all the available vulnerabilities present in my network and double click on any vulnerability to see the description about it.