On Wed, 5 Dec 2001 at 11:31, macky wrote:
> i tested that site already and the only thing good about it is that it
> gives us infos and links on the possible flaw on a specific port....

I tested it too, and yes, it does have its good points (ie: it tests UDP
ports too, I haven't figured out how to get NMAP to do that ... but maybe
I just haven't read the manpage well enough?).

> i still like NMAP... since its easy to use.... not like NESSUS u still
> have to do a lot of things (IMHO).....

I'd like to correct this. Nessus is very easy to set up. Here's how I do
it:

1. Install the nessus or nessusd package. On Debian, an "apt-get install
nessus nessusd" should do the trick. nessus is the client/front-end,
nessusd, the "server".

2. As root, run nessus-adduser to create nessus users that have the
authority to use the "server". This is important. You don't want just
about anybody using your nessus "server" to launch attacks/tests, do you?

3. Run nessusd. I run this using "nessusd -D -a 127.0.0.1" to prevent
remote connections to the "server".

3. Run the front-end. BTW, there's a front-end for Windows, too. Connect
to the "server", configure the attack/test, and fire away. You can
configure scans to run detached, too. You will be emailed the report.

Unlike a simple portscanner, nessus is a complete security audit tool. It
will not just tell you that you have so-and-so service listening on
so-and-so port. It will, using its plugins database, run various known
exploits on this port and let you know what the service is vulnerable too.

 --> Jijo

--
Federico Sevilla III  :: [EMAIL PROTECTED]
Network Administrator :: The Leather Collection, Inc.
GnuPG Key: <http://jijo.leathercollection.ph/jijo.gpg>

_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to