Hi,
I'm new in using the nessus test tool.
I wish to use the nessus for penetration testing in my private network. I did
"Scan the port" with all the built-in plug-ins from either Nessus client GUI or
command line from Linux.
Note: in .nessusrc, the "safe_check" = no, all the plugin IDs are set to
"Yes".
In Linux: the following command is used:
nessus -c /home/arte/.nessus.rc -T html -q localhost 1241 nessus nessus
/usr/bin/target2.txt output
I wonder if the above method for penetration test is right ? What is the
right way to do for Nessus to dislay the penetration result in the report? (or
show the end user what type of plug-ins are used?)
Thank you in advance,
Sue
---------------------------------
Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try it now._______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus