Still a nessus newbie here getting a lot of grief when I perform a
nessus scan and it attacks the unix servers with bogus usernames. I know
for a fact that, I do not have any unauthorized users and/or weak
passwords on my systems, as I have scripts running daily or more
frequently, checking against such incidences. I do not need nessus to
test this vulnerability.

I am launching nessus from the linux command line as follows: 

/opt/nessus/bin/nessus -q nessus01 1241 adminuser adminpasswd
targetservers.lst scanresults.html

I do not have a chance to get to a graphical interface to pick and
choose what will be scanned and what not, as these command line scan
directives will be launched from a cron job, periodically. 

So my exact question is, how can I add a switch to this command of mine
to tell nesses not to do the username attacking.

Thanks for all the responses in advance.

Mel
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to