Is there a way from the command line to turn on the "plug-in" parameter in 
order to let the scan report display the attacks (what types of plug-in) were 
used in the
port scan?

Thanks again.


Mikhail Utin <[EMAIL PROTECTED]> wrote:       PenTesting is usually means you 
are going to use  real exploits. While "safe_check" = no is  basically correct, 
not all plugins will be exploits. You can do "fuzzy" scanning  as well. It 
means you identify opened ports first (or have all 64K ports), and  next use 
ALL plugins against. It creates pretty tuff scanning. However, it takes  
significant time even for one host.
 Good luck
    ----- Original Message ----- 
   From:    Shuang    Zheng 
   To: [email protected] 
   Sent: Tuesday, February 26, 2008 1:07    PM
   Subject: About penetration test via    Nessus
   

   Hi,
    
   I'm new in using the nessus test    tool.
   I wish to use the nessus for    penetration testing in my private network. I 
did "Scan the port" with all    the built-in plug-ins from either Nessus client 
GUI or command line from    Linux.
   Note: in .nessusrc, the "safe_check"    = no, all the plugin IDs are set to 
"Yes".
    
   In Linux: the following command is    used:
   nessus -c /home/arte/.nessus.rc -T html -q localhost 1241    nessus nessus 
/usr/bin/target2.txt output
    
   I wonder if the above method    for penetration test is right ? What is the 
right way to do for Nessus to    dislay the penetration result in the report? 
(or show the end user what type    of plug-ins are used?)
    
   Thank you in advance,
   Sue
    
    
      

---------------------------------
   Be a better friend, newshound, and know-it-all with Yahoo! Mobile. Try    it 
now.      

---------------------------------
    
_______________________________________________
Nessus mailing    list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

       
---------------------------------
Never miss a thing.   Make Yahoo your homepage.
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to