How to use nessus and exploit DB on backtrak 5 R1
Open nessus and star
open localhost:8834 in browser
it will exit the display as below
pleace wait the process is complete, when finished it will exit the display as below
then input user name and password
select the scan and then add
input the name is up to you
on the policy select the category that will be scanned
the target input scan targets to be scanned
select lounch scan
when the scan is complete look at the picture below
doubel click on one of which is complete scanan, it will exit the following result
above is the result of the scan
above is a scan of dmna kalemahan total, high, medium, low, and ports open
results from the largest total protocol
above is the plugin name from the windows system is scanned
open the application exploitDB search,
above is the command to know the type of data and type the command ftp
above is the command to know the type of data and type the command samba
running exploits
The above are the order in which the nano nano is to menedit ip address and there is also this platform is the cp command to copy files that exploit
and above there are two orders of nano and perl where perl is to run the exploit Namu exploits that I did not find its location
0 comments:
Post a Comment