hello all,
 
I have a presentation on demonstrating the Gain Root Remotely plugin family for linux version of nessus. I have the GUI version up and running yet when I run a scan with only the gain root remotely family selected; there are no vulnerabilities found. I know this is good, but this is on a test system and I was wondering if there are any easy exploits that I can implement on the linux box so that Nessus does pick it up [and thus gives me a working demonstration for the presentation]
 
 
Thank You,
 
 
Matthew Gonzalez
Network Administration [BT] Major
Morrisville State College
Morrisville, NY
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to