Hi,
   
  I'm new in using the nessus test tool.
  I wish to use the nessus for penetration testing in my private network. I did 
"Scan the port" with all the built-in plug-ins from either Nessus client GUI or 
command line from Linux.
  Note: in .nessusrc, the "safe_check" = no, all the plugin IDs are set to 
"Yes".
   
  In Linux: the following command is used:
  nessus -c /home/arte/.nessus.rc -T html -q localhost 1241 nessus nessus 
/usr/bin/target2.txt output
   
  I wonder if the above method for penetration test is right ? What is the 
right way to do for Nessus to dislay the penetration result in the report? (or 
show the end user what type of plug-ins are used?)
   
  Thank you in advance,
  Sue
   
   

       
---------------------------------
Be a better friend, newshound, and know-it-all with Yahoo! Mobile.  Try it now.
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to