On Wed, 5 Dec 2001 at 11:31, macky wrote: > i tested that site already and the only thing good about it is that it > gives us infos and links on the possible flaw on a specific port....
I tested it too, and yes, it does have its good points (ie: it tests UDP ports too, I haven't figured out how to get NMAP to do that ... but maybe I just haven't read the manpage well enough?). > i still like NMAP... since its easy to use.... not like NESSUS u still > have to do a lot of things (IMHO)..... I'd like to correct this. Nessus is very easy to set up. Here's how I do it: 1. Install the nessus or nessusd package. On Debian, an "apt-get install nessus nessusd" should do the trick. nessus is the client/front-end, nessusd, the "server". 2. As root, run nessus-adduser to create nessus users that have the authority to use the "server". This is important. You don't want just about anybody using your nessus "server" to launch attacks/tests, do you? 3. Run nessusd. I run this using "nessusd -D -a 127.0.0.1" to prevent remote connections to the "server". 3. Run the front-end. BTW, there's a front-end for Windows, too. Connect to the "server", configure the attack/test, and fire away. You can configure scans to run detached, too. You will be emailed the report. Unlike a simple portscanner, nessus is a complete security audit tool. It will not just tell you that you have so-and-so service listening on so-and-so port. It will, using its plugins database, run various known exploits on this port and let you know what the service is vulnerable too. --> Jijo -- Federico Sevilla III :: [EMAIL PROTECTED] Network Administrator :: The Leather Collection, Inc. GnuPG Key: <http://jijo.leathercollection.ph/jijo.gpg> _ Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph To leave: send "unsubscribe" in the body to [EMAIL PROTECTED] To subscribe to the Linux Newbies' List: send "subscribe" in the body to [EMAIL PROTECTED]
