1 00:00:00,06 --> 00:00:03,07 - Nessus is a web application. 2 00:00:03,07 --> 00:00:05,04 Once you install Nessus, 3 00:00:05,04 --> 00:00:08,06 you can use it through your web browser. 4 00:00:08,06 --> 00:00:11,08 Make sure that you're tapping the right URL. 5 00:00:11,08 --> 00:00:16,02 Local host colon eight, eight, three, four. 6 00:00:16,02 --> 00:00:19,08 Ignore the not secure warning. 7 00:00:19,08 --> 00:00:21,06 Let's sign on to an Nessus 8 00:00:21,06 --> 00:00:24,08 by giving the username and the password. 9 00:00:24,08 --> 00:00:30,02 My username is root. 10 00:00:30,02 --> 00:00:33,08 Click on sign in. 11 00:00:33,08 --> 00:00:36,09 I already ran a couple of scans. 12 00:00:36,09 --> 00:00:39,07 The first scan was host discovery 13 00:00:39,07 --> 00:00:48,01 which finds all the devices connected to your network. 14 00:00:48,01 --> 00:00:55,01 It also shows open ports for each host. 15 00:00:55,01 --> 00:00:59,03 In addition to the host discovery scan type, 16 00:00:59,03 --> 00:01:02,04 there are many others you can run. 17 00:01:02,04 --> 00:01:06,06 To do a new scan, click on the plus sign here. 18 00:01:06,06 --> 00:01:09,00 There are three major scan types; 19 00:01:09,00 --> 00:01:15,03 discovery, vulnerabilities, 20 00:01:15,03 --> 00:01:20,06 and compliance. 21 00:01:20,06 --> 00:01:26,04 Let's run a new basic network scan. 22 00:01:26,04 --> 00:01:32,06 The name of this scan is test. 23 00:01:32,06 --> 00:01:35,08 The targets are the host to be scanned. 24 00:01:35,08 --> 00:01:39,09 We can scan our entire sub-net by typing 25 00:01:39,09 --> 00:01:48,01 10.0.0.0/24. 26 00:01:48,01 --> 00:01:55,03 Select launch and click on it. 27 00:01:55,03 --> 00:01:57,09 The scan is running. 28 00:01:57,09 --> 00:02:03,02 While the scan is going on, you can also see the status. 29 00:02:03,02 --> 00:02:07,09 Nessus is already finding many vulnerabilities here. 30 00:02:07,09 --> 00:02:11,06 Nessus prioritizes the vulnerabilities 31 00:02:11,06 --> 00:02:17,02 and allows you to tackle the most serious ones first. 32 00:02:17,02 --> 00:02:20,06 You like what you've seen so far? 33 00:02:20,06 --> 00:02:23,07 Network vulnerability assessment could be 34 00:02:23,07 --> 00:02:27,05 a user-friendly and satisfying experience. 35 00:02:27,05 --> 00:02:30,00 And Nessus is proof of that.