Still a nessus newbie here getting a lot of grief when I perform a nessus scan and it attacks the unix servers with bogus usernames. I know for a fact that, I do not have any unauthorized users and/or weak passwords on my systems, as I have scripts running daily or more frequently, checking against such incidences. I do not need nessus to test this vulnerability.
I am launching nessus from the linux command line as follows: /opt/nessus/bin/nessus -q nessus01 1241 adminuser adminpasswd targetservers.lst scanresults.html I do not have a chance to get to a graphical interface to pick and choose what will be scanned and what not, as these command line scan directives will be launched from a cron job, periodically. So my exact question is, how can I add a switch to this command of mine to tell nesses not to do the username attacking. Thanks for all the responses in advance. Mel _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
