Nessus vulnerability, Computer Network Security

Assignment Help:

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. So the Nmap scan shows that the WinXP system has IP address 192.168.58.133.

Next, I used the Nessus vulnerability scanner to scan WinXP for vulnerabilities. First, I started the Nessus server; by left clicking on its icon and then on the Start Nessus Server box. The Nessus server opened port 8834 and wait for a connection; sometimes it may take the server a couple of minutes to open this port. Then, I started my browser, connected to https://localhost:8834, and provided my username and password. The first time, my system did not recognize the certificate of Nessus and generated a warning message. I ignored it and accepted the certificate. If you use Bt5, check steps 6,7,8,9,10 of Nessus-Bt5 URL; of the Project URL. At the top of the Nessus window there are three tabs: Reports, Scans, Policies. I left-clicked on Policies, and then on +Add. The Add Policy window opened that enables defining a scanning policy. That is, which hosts and ports should be scanned as well as what vulnerabilities checks should be conducted. Nessus provides a lot of flexibility in specifying what Nessus must do. I used the default Nessus policy which is also very effective. So in the Name box, I simply typed Karvelas and in the Description box I typed "WinXP-SP2 Vulnerability Analysis". Then, I clicked on Next at the bottom right corner of the Nessus window. The next screenshot shows the Nessus settings. Note that if you use the Nessus of BT5, then in order to see (and click) Next, you must first expand the VMware Player to occupy all the screen of your host operating system. You can do this by left-clicking on the box at the right corner of the top bar of the VMware player which is located above the date and time.


Related Discussions:- Nessus vulnerability

Explain major differences between wpa and wpa2, Question: Suppose the f...

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Frame format and error detection, FRAME FORMAT AND ERROR DETECTION The...

FRAME FORMAT AND ERROR DETECTION The changed frame format also adds CRC. If there is an error happened in frame, then it typically causes receiver to removed frame. The frame

Develop a tcp-based client-server socket program, Develop a TCP-based clien...

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Mention most relevant clause of iso 27001:2005, QUESTION (In this ques...

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

Enterprise information security policy (eisp), Enterprise Information Secur...

Enterprise Information Security Policy (EISP) EISP also known as security policy directly supports the mission of the organization and sets the strategic direction, scope, and t

Encryption, How safe is the encryption of virtual private networks?

How safe is the encryption of virtual private networks?

What is b-router, B-Router Hybrid devices that has the features of bot...

B-Router Hybrid devices that has the features of both routers and bridges . A bridge router or brouter is a network machine that acts as a router and as a bridge. The brout

The cost benefit analysis (cba) formula, The Cost Benefit Analysis (CBA) Fo...

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

Media, what is guided media or unguided media

what is guided media or unguided media

Issue-specific security policy (issp), Issue-Specific Security Policy (ISSP...

Issue-Specific Security Policy (ISSP) The ISSP addresses specific areas of technology, needs frequent updates and having statement on organization’s position on a particular iss

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd