hello all,
I have a presentation on demonstrating the Gain
Root Remotely plugin family for linux version of nessus. I have the GUI version
up and running yet when I run a scan with only the gain root remotely family
selected; there are no vulnerabilities found. I know this is good, but this is
on a test system and I was wondering if there are any easy exploits that I can
implement on the linux box so that Nessus does pick it up [and thus gives me a
working demonstration for the presentation]
Thank You,
Matthew Gonzalez
Network Administration [BT] Major
Morrisville State College
Morrisville, NY
_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
