How to use Nessus Vulnerability Scanning A Beginner's Guide to Network Security

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] hello guys how are you welcome to another video it's go and today I want to see how we can scan some targets with nesus scanner while L with scanner so we install we showed how uh we can install that on another video so you can have a look at there uh and now we want to start working with nesus and this video is just going to be quick video how to have a scan but I will create another video which we will really go in detail with nesus dashboard and the capabilities of it so just let's uh get it started so we say yeah Service uh start so with this command we will start nesus and now it ask for our password so we provide the password and uh yeah now we should go to our browser and then go to the URL so here instead of K so my the name of my machine is K but depends what what the name of your machine is so basically this is the name that you should put in the uh browser in the URL and then this is the port default Port of nus after that we will go to n dashboard so I was already logged in but probably if you come you have to log in by again the user password which we already talked about in the first video and now we just jumped in so you can see here uh I will uh create another video talk about nesus in really details so every tab every option but today we want to just uh set up a fast vity scanner of a host and yeah there we go so if we go to uh my scan here and there is a create a new scan we click here and then these are type of scans and that are available for us but you see some of them are tagged with upgrades so with this Community Edition we cannot do them but some others we can do but today we want to work with basic Network scan so as you see it's a full system scanner uh suitable for any host so we want to start with it today uh yeah let's get started so we click on the basic uh scan and now we come to this page so you can name it whatever you want I would name it test underline host so in this U case so we are going to test my my machine so the machine itself therefore yeah the folder my scan is okay it comes here and the target is 127.0 0.1 so you see this is the IP address of my host I mean the machine itself and then yeah there are other tabs but uh you know they go more advanced a little bit so we will talk in another video but now just yeah I want to set it up so fast so yeah after that yeah test host my scan and this is the IP address and then uh we hit save button and now it should create for us yeah as you see so in my scan folder so there is a test H and it's on demand because we didn't set any timer any schedule or anything so here we can send it to try so we want to delete it and and uh here this is the last scan so there's no data because we just created and here is L so we hit launch and now it starts to scan our host so if we click on there and now we go here so you can see here this is the scan details and here it shows us the information uh about vity so critical high medium low and just infos so we should uh wait so as you see it's 4% 5% here you can also see it here and it takes a little bit time so it's gaining information you can hit it here vulnerabilities you can see here so they are categorized as info so they are not really vulnerability they are just information about the system and uh yeah so we should wait a little bit uh for it scan to be over and then uh yeah we come back again to this video so because I'm just going to pause the video because it takes a little bit time want to scan everything and uh yeah I will be back soon yeah as you see here the scan is over and status is completed and yeah when we click there so it shows us different uh information so while it is 39 but most of them are information just the first one is in medium so it's SSL multiple issues so you come here and it shows everything in detail and then you go there it also shows CVSs and here there's a description about the problem and then more resources more information about the problem and uh yeah that's it so it's so easy so practical so all the security Engineers everybody who works in security has to know how to work with uh nesus and this is one of the uh most important assets of a company of security team of a company so I hope you've enjoyed that so we will uh go for more videos with the same topic n there's a lot that we can do with it but today I just wanted to Simply show you how we can get started n so I hope you have enjoyed and see you next time bye-bye
Info
Channel: GoliTech
Views: 598
Rating: undefined out of 5
Keywords: Cybersecurity, EthicalHacking, PenetrationTesting, InformationSecurity, ApplicationSecurity, RedTeam, BlueTeam, Technology, Golitech, Nessus, Vulnerability Scanner, Network Security, IT Security, Penetration Testing, Security Tools, Vulnerability Management, Information Security, Cyber Threats, Network Scanning, Cyber Defense, IT Governance, Vulnerability Assessment, Security Auditing, Threat Intelligence, IT Compliance, Cyber Resilience, Exploit Detection, Patch Management
Id: sV_N3991v5I
Channel Id: undefined
Length: 5min 44sec (344 seconds)
Published: Fri Nov 24 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.