WEBVTT

00:00.920 --> 00:06.550
A little bit even in the previous year do you have learnt about how to install Les's on the machine

00:06.890 --> 00:07.740
on this video.

00:07.740 --> 00:11.890
We'll see how to use Nessa's performer and Ridley Scott.

00:11.890 --> 00:19.360
So in this video we'll have a walkthrough of this this kind and see the different types of scans available

00:19.360 --> 00:23.290
in nesses and then we'll learn how to configure and runner.

00:23.380 --> 00:26.570
Well it really is kind of hard choice one just kind is complete.

00:26.610 --> 00:30.770
Go through the research to understand how to make sense out of this Gunders works.

00:30.940 --> 00:34.000
And then we'll see what needs to be done next.

00:34.000 --> 00:41.620
Now let's quickly move to machine as we remember in the last video was the installation is completed.

00:41.740 --> 00:48.580
If you want to use Nessus you'll need to browse to the link as shown where your local host and port

00:48.580 --> 00:51.540
number eight directly will and you will get this.

00:51.590 --> 00:55.610
Nothing beats this need to enter the username password which you have configured.

00:55.680 --> 00:57.580
Well the installation process is what's going on.

00:57.670 --> 00:58.770
And then press.

00:58.780 --> 01:04.290
And so once you're done with log in you'll be presented with the screen over here.

01:04.300 --> 01:08.860
If you go into it bizarre things you get to certain states.

01:09.030 --> 01:09.820
Menaces.

01:09.900 --> 01:11.190
Kind of it is online.

01:11.260 --> 01:13.250
This is the latest version available.

01:13.360 --> 01:16.610
And it also shows me last updated on what date and so on.

01:16.780 --> 01:22.460
So time and again you should keep updating your Nessus so that you are flagons up a bit.

01:22.600 --> 01:28.090
And if any kind of game a new version is released just need to come yet in a big Denis's version to

01:28.150 --> 01:28.970
the latest version.

01:29.050 --> 01:34.900
So this is a searchings window that you can do all the things you can create more accounts if you want

01:34.900 --> 01:37.160
to allow other people to use nisus.

01:37.170 --> 01:42.460
But from the different local you can configure it as the piece over our proxy server.

01:42.520 --> 01:48.790
If undercook has DAC so that nesses can also use it when performing just get an item to the server so

01:48.790 --> 01:52.650
that it can send mails automatically to you as an administrator.

01:53.640 --> 01:56.700
There are a few old ones or things that's going to continue.

01:56.760 --> 01:58.440
Good morning Genesis.

01:58.490 --> 01:59.740
So that are plugged in.

01:59.840 --> 02:05.960
There are different configuration files that are not enabled by default but if you want to use it against

02:06.200 --> 02:13.580
unlabelled for example part of it if it enables it not necessarily automatically update and so to just

02:13.580 --> 02:19.640
go through this list understanding each of them and you should get more familiar with this is coming

02:19.640 --> 02:23.480
back to the homepage you have this KUNZMANN going the policy is Bindo.

02:23.530 --> 02:31.700
So if I go into politics and the new policy I can create a policy of this scanner complex and if I come

02:31.700 --> 02:39.210
back to scan scan again it shows all the company actually the next thing that we can do is then you

02:39.240 --> 02:47.790
create a scan and then it will be saved run under my skin folder or you can create a new folder to segregate

02:47.790 --> 02:51.150
discussed that you perform on different networks.

02:51.260 --> 02:57.570
Now talking about DVDs and tapes types available in Nessus This allows you to perform a basic Necros

02:57.570 --> 02:59.440
can scan.

02:59.490 --> 03:05.270
You can also perform the credential past or that that you have credentials of Unical devices.

03:05.340 --> 03:12.920
And based on that you can home in donor device can also Nessus can help you perform that show subduction.

03:12.940 --> 03:18.210
And what exactly it means using the best detection we can look for.

03:18.330 --> 03:24.450
Well it does in the Linux and Mac machines but the shellshock is just going to be used to perform scans

03:24.450 --> 03:31.860
on the machines and you can also perform the application testing by using a scanner and there are many

03:31.860 --> 03:34.450
more complex available to perform this scan.

03:34.500 --> 03:41.550
If you come over here and we see you have the advance scan there are a few features we did believe it

03:41.580 --> 03:46.420
or live it once you upgrade you on SS to a professional or some other version.

03:46.460 --> 03:53.520
So did the cloud infrastructure can also be or could using NASA's back not correction down detection

03:53.570 --> 03:55.230
hold discovery and so on.

03:55.280 --> 04:02.040
You can also performed on television that can using Nessus and the mobile devices can be scanned using

04:02.040 --> 04:08.730
misses you can have configuration audits you can perform a policy compliance and so on.

04:08.760 --> 04:14.940
And essentially we have seen the great and some of it so even that can be scanned using nisus if it

04:14.930 --> 04:16.920
is the latest version of data.

04:17.010 --> 04:19.950
Now let's quickly see how we can do a scan.

04:20.060 --> 04:26.100
So for them bloopers because I've down on my modest portable version machine on which I'll run a scan

04:27.440 --> 04:30.710
in your case you can have another machine in your network.

04:30.830 --> 04:36.440
If you have your own network you can perform this kind of network but make sure that you don't perform

04:36.440 --> 04:42.020
a scan on someone else's network without the prior permission and preferably the former.

04:42.160 --> 04:44.260
It's all coming back man said click on your scan.

04:44.270 --> 04:45.310
I have two options.

04:45.320 --> 04:51.300
Support non-guilt just put a home basic Netflix can select this template from snorting.

04:51.470 --> 04:59.810
Once it template loads will ask you for a name so you can get it in any name like an this table you're

04:59.920 --> 05:01.320
going to give some description.

05:01.400 --> 05:04.170
You can choose the four letter word you would like receive your scan.

05:04.170 --> 05:06.120
Some just need immediately forward.

05:06.230 --> 05:10.070
And then if you are performing a scan only for a particular machine.

05:10.380 --> 05:16.400
The problem machine's IP address and if you are performing this can plug the computer network in good

05:16.600 --> 05:19.620
form this can be entering the network IP.

05:19.760 --> 05:24.960
So I will be doing it only for one machine because I'm going to work on network.

05:25.010 --> 05:29.830
So I don't have any BMC running to enter the IP address or maybe just part of the machine reachable

05:29.880 --> 05:30.730
to the children.

05:30.910 --> 05:34.740
And then surely will I can enable a child if I want to run this kind of data.

05:34.910 --> 05:41.340
But nobody would know if my piece of wire is configured then the notification to nest is gone.

05:41.360 --> 05:42.520
You are worthless to me.

05:42.560 --> 05:45.200
Militarists and not neutral at the moment.

05:45.340 --> 05:51.340
Commingle discovery begins to scan they support scan for a common border or fork's.

05:51.390 --> 05:52.330
Again your choice.

05:52.340 --> 05:55.560
Just leave it as common at the moment in assessment.

05:55.870 --> 05:57.100
To scan day.

05:57.200 --> 05:58.780
Next your scan for the defogger.

05:58.790 --> 06:05.180
Services or even to scan for verbal and routine also ends on the people being complete.

06:05.280 --> 06:07.570
Just as you what you need in the report.

06:07.610 --> 06:12.500
So it does allow users to understand Izzard's designate who is by their DNS name.

06:12.500 --> 06:20.210
So if your network has many computers and you identify the machines the DNS name you can run with actually

06:20.570 --> 06:21.160
and so on.

06:21.210 --> 06:27.920
So once you are done with the configurations over your gun again your credentials have no this can be

06:27.920 --> 06:30.540
used to the home credentials scanning also.

06:30.590 --> 06:33.200
So let's say I select Windows.

06:33.380 --> 06:40.630
So if I have early Vicary instead of the machine that I can enter the digital area and home a scan.

06:40.760 --> 06:45.750
If not then just remove this current And just can come back to the settings of the crosschecking who

06:45.760 --> 06:46.770
are getting it done.

06:46.770 --> 06:49.100
And you can save this for.

06:49.290 --> 06:56.230
So in this way you can do any skin type you want to configure and then just kind of skated up the list

06:56.230 --> 07:02.220
to where you just need to click on launch and this scandal start running so you can see the scan is

07:02.220 --> 07:03.400
running at the moment.

07:03.480 --> 07:09.840
This may take some time to compute the scan depending on the network size or the machine on which you

07:10.120 --> 07:11.970
want to let it continue.

07:13.240 --> 07:21.000
Now as this scan is progressing if I just click on the scan it will show me what it has been identified.

07:21.320 --> 07:26.770
So you can see over here even the roadways that are being divider shown in different colors.

07:26.840 --> 07:31.040
So in deference to the I will replace the medium.

07:31.070 --> 07:34.350
These are just informations that are being displayed and so on.

07:34.420 --> 07:35.840
You not clear on this.

07:35.850 --> 07:37.920
It could show me a list of days.

07:37.970 --> 07:38.610
Indeed.

07:38.690 --> 07:43.870
So my model of the machine has the ability that is very critical also.

07:44.000 --> 07:50.970
Ok so today is kind of his computer I guess if they come back again just check it is still running.

07:51.040 --> 07:54.700
Will that quickly do that is ERTS exodus is going to be that.

07:54.710 --> 07:57.210
I wondered if I had on the indices of a bus.

07:57.310 --> 08:01.170
So similarly there are many other remedies that are being derailed by this.

08:01.210 --> 08:06.470
Now as a penetration tester you just need to cross check if this one really actually exists.

08:06.510 --> 08:08.650
Or is it a false positive for doing so.

08:08.650 --> 08:12.740
It is like to explode the DNC server on the machine.

08:12.810 --> 08:15.090
Not talking more about this that is or you are.

08:15.170 --> 08:20.200
If I click on any one that has been displayed you can see that it is about Iran.

08:20.270 --> 08:23.310
So what is the description what exactly this when we're good at those too.

08:23.330 --> 08:28.180
If you are an actor I I'm sure you can see how to secure this one already.

08:28.310 --> 08:33.840
There are some details about the Unisys plugin that has been used to perform the scan and information.

08:33.840 --> 08:37.800
And so now we have to wait for the -- to complete completely.

08:37.810 --> 08:42.840
Because this kind is completed it will give you more options in the page.

08:42.890 --> 08:44.220
Now this guy is going on.

08:44.300 --> 08:47.400
Let's move on to another scan which I have ordered even Zegerid to earlier.

08:47.480 --> 08:53.360
So if I see this scan as you are here you have all the one that is listed on you also.

08:53.390 --> 08:54.780
Therefore damnations.

08:54.810 --> 09:00.500
So if I go to immolations does taking the following actions across one host would result 3 percent of

09:00.500 --> 09:01.090
the win.

09:01.160 --> 09:05.050
So there are few things that are common for the complete machine.

09:05.090 --> 09:11.570
So limitation helps you identify what can be a common solution for most on one of your guests.

09:11.630 --> 09:18.670
But our Gazidis is a bit to be about your version on the target machine and it sure has all of the amenities

09:18.920 --> 09:23.970
the same base for other machines that you just cannot with this could be different.

09:24.140 --> 09:27.890
So I guess now you have a clear understanding of how to use Nessus.

09:28.010 --> 09:33.950
The performance can just need to learn more about the different types to understand when to use this

09:33.970 --> 09:35.110
type of scan.

09:35.120 --> 09:37.670
Not believing that as an exercise.

09:37.670 --> 09:39.590
Hopefully you'll be clear with it.

09:39.710 --> 09:44.600
In this video we have learnt about how to use Ness's to perform a scan then the next video will see

09:44.600 --> 09:47.180
how it breaks for the next iscan output.

09:47.450 --> 09:49.740
They use how busy you did think you.
