Preview

Describe Various Uses of Nessus

Satisfactory Essays
Open Document
Open Document
692 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Describe Various Uses of Nessus
1. What operating systems are running on the different hosts
This is done by running this command on command prompt
# nmap -sS -O “host IP address
#nmap-os-db

2. What web server (if any) is running on each computer?
Answer:

3. List several services running on each computer? 4. Which host had the highest number of vulnerabilites? The least number of vulnerabilities? 5. Identify one high severity vulnerability for each computer (if there is one). Describe the vulnerability and discuss control(s) to minimize the risk from the vulnerability.

Answer: one high severity vulnerability for each is port attack. vulnerability is a weakness which allows hacker to attack on system. Nessus is a vulnerability scanner that offers many features to help assess the security of control system networks, devices, servers and workstations.
Control to minimize the risk from the vulnerability are: 1. Port scanning 2. Host scanning

Describe various uses of Nessus.
Answer: Its main priority is to detect the vulnurabilities on the tested systems such as follows: 1. It checks the vulnerabilities which resists a remote cracker to get control or access the sensitive data on a user systems. 2. It is used to catch the misconfiguration such as open mail relay, missing patches. 3. It is also used to catch the password related vulnerabilities such as default passwords, some common passwords, as well blank passwords on some system accounts. So to prevent all this it can also call a tool which is external called Hydra to launch the most protected dictionary attack. 4. Using mangled packets its been used for services such as denials of service. 5. It is also used in the preparation of PCS DSS audits.

What are the differences between using Nessus and Nmap?
Answer: 1. Nessus is typically port scanner tool which considered open port to check security vulnerabilities whereas Nmap is purely host detection and port discovery tool.
2

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 3 Quiz

    • 501 Words
    • 3 Pages

    to set parameters for the Last Two Digit test and for creating suspicious output databases.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7) How does Nessus differ from ZeNmap GUI and which tool would you use for network discovery and inventory versus identifying software vulnerabilities?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    During the first two phases of the five step process of a cyber-attack a hacker conducts reconnaissance of the target network and scans for any vulnerabilities that could be exploited. (EC-Council, 2009) These vulnerabilities are known as a system’s attack surface. One of the core job functions of Network administrators is reducing this attack surface through a process called system hardening. There a number of techniques that can be used to harden Microsoft clients and servers such as scanning the system with nmap to find any vulnerabilities that comes from having open ports. After the initial scan the administrator should close open ports and uninstall unnecessary services. (Solomon, 2014) Administrators should also run follow up scans with nmap to make sure that there are no ports or services that they may have missed during their first run. Nmap is not the only program that can identify vulnerabilities within a server, the SCW utility should also be used when you are installing new server hardware to check for any unwanted services that may be set to run on the server as a default setting. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 257 Words
    • 2 Pages

    1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    6. When considering the implementation of software updates, software patches, and software fixes, why must you test this upgrade or software patch before you implement this as a risk mitigation tactic? To make sure they work as promised and don’t leave open vulnerabilities…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    What component of the overall security objective deserves the most attention in the environments mentioned in the article? What components would be less pertinent for these particular environments during a vulnerability assessment? Why?…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Assessment Lab 1

    • 741 Words
    • 5 Pages

    2. How many threats and vulnerabilities did you find that impacted risk in each of the seven…

    • 741 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cyber Espionage

    • 3589 Words
    • 15 Pages

    | involves the unauthorized probing to test a target computer’s configuration or evaluate its system defenses, or the unauthorized viewing and copying of data files.…

    • 3589 Words
    • 15 Pages
    Powerful Essays