O'Reilly logo

Learning Nessus for Penetration Testing by Himanshu Kumar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Scan configuration

A sequential reading of this chapter is required for readers before jumping into this section. In the previous sections, we have explained the prerequisites one should take care of before running a scan. Also, it has been discussed how a scan policy should be configured and customized as per the target organizations security policy and what the differences are between a credential and a noncredential scan.

Configuring a new scan

How to initiate and execute a scan is illustrated in this section. To initiate a scan, we assume that the scan prerequisites that were previously mentioned in this chapter have been executed. For initiating a scan, log in to Nessus by using your Nessus credentials and click on Scan Queue from the uppermost ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required