Nessus allows you to remotely audit a network and determine if it has been broken into or misused in some way. It also provides the ability to locally audit a specific machine for vulnerabilities.
Objective

- Use the Nessus tool
- Scan the network for vulnerabilities
Scenario
If an attacker gains physical access to a switch or other network device, he or she will be able to successfully install a rogue network device; therefore, as an Information Security Auditor/ Penetration Tester, you should disable unused ports in the configuration of the device. Also, it is very important that you use some methodology in detecting such rogue devices on the network.
As an expert penetration tester, you must understand how vulnerabilities, compliance specifications, and content policy violations are scanned using the Nessus tool.
Vulnerability Analysis
The Security Analyst Exercises / Vulnerability Analysis contains the following Exercises:
- Vulnerability Analysis Using the Nessus Tool
The Virtual Private Cloud for this Lab set utilizes:
Security Analyst Exercises are available as part of the following subscription:
Lab exercises are included for:
- TCPIP Packet Analysis
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- SQL Penetration Testing