Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)

Sdílet
Vložit
  • čas přidán 22. 06. 2024
  • How do you detect vulnerabilities that exist in a network or on a system?
    Start learning Cybersecurity today ➡️ www.cybertrainingpro.com/
    The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus.
    In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so.
    Nessus Essentials Download: www.tenable.com/products/ness...
    Practical Vulnerability Management: amzn.to/30JphEa
    Vulnerability Management: amzn.to/2ZXhfbk
    Security Risk Management: amzn.to/3jFjXtW
    =============================
    Today’s Video Sponsor
    =============================
    Are you interested in sponsoring content? ➡️ jongood.com/sponsor
    =============================
    Popular Cybersecurity Resources
    =============================
    Getting Started Resources & Free eBook ➡️ www.jongood.com/getstarted/
    Cybersecurity Q&A ➡️ • Cyber Security Q&A
    Cybersecurity Projects ➡️ • Cyber Security Projects
    Cybersecurity Training & Career Services ➡️ www.CyberTrainingPro.com/
    =============================
    Cool Tech that I Use in My Studio
    =============================
    Gear List ➡️ jongood.com/affiliates/amazon/
    =============================
    Connect with me!
    =============================
    LinkedIn: ➡︎ / jongoodcyber
    Twitter: ➡︎ / jongoodcyber
    Instagram: ➡︎ / jongoodcyber
    ⏰ Timecodes ⏰
    0:00 Introduction
    1:25 CIS Top 20 Controls
    2:28 Nessus Introduction
    3:51 Nessus Installation
    8:03 Discovery Scan
    8:31 Basic Nessus Scan
    8:58 Review Findings
    10:49 CVE Findings
    11:49 Question of the Day
    12:03 Final Comments
    =============================
    #TenableNessus #VulnerabilityManagement #VulnerabilityScanner
    DISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.
    DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
  • Věda a technologie

Komentáře • 225

  • @JonGoodCyber
    @JonGoodCyber  Před 3 lety +25

    Here are some related learning resources:
    Practical Vulnerability Management: amzn.to/30JphEa
    Vulnerability Management: amzn.to/2ZXhfbk
    Security Risk Management: amzn.to/3jFjXtW

    • @ericmalaba6540
      @ericmalaba6540 Před 3 lety +1

      i try to download nessus with my gmail ac count doesn't work, what sould i do please ?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      I am not sure why you would be having problems with gmail. I would try reaching out to Tenable.

  • @henryufuomaogboru5310
    @henryufuomaogboru5310 Před měsícem +3

    Your video just simplified the use of nessus for me. Thanks a million, Bro.

    • @JonGoodCyber
      @JonGoodCyber  Před měsícem +1

      Glad to hear that and you are welcome!

  • @Jupiterxice
    @Jupiterxice Před 2 lety +57

    Nessus is so easy it does all the work for you. Funny thing at a Job interview I said I used Nmap and they thought I had no experience in vulnerability scanning

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +12

      Unfortunately, vulnerability scanners aren't always accurate and frequently will report false positives but they do help shorten the discovery process. I'm not surprised about that happening with nmap since people generally expect to hear about the major commercial products like Nessus. It seems a little random to not have any experience with tools like Nessus or OpenVAS if you are tinkering around with finding vulnerabilities using nmap though. That is a good example of why you need to assume an interviewer doesn't have much practical knowledge and explain things until that is proven otherwise.

    • @Jupiterxice
      @Jupiterxice Před 2 lety +4

      @@JonGoodCyber bruh I had to adjust him and say to him yes I had experiment with nessus but in under grad. Smh I come from a pen tester perspective. Smh I can tell various ISSOs at my job going to have a rude awakening how I can show them how vulnerability scanning can be done

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +19

      To be fair, nmap is very limited in vulnerability detection. The primary purpose of nmap isn't vulnerability detection even though we can identify potential attack vectors based on the information, although a crafty admin could change the banners and make things more challenging. In any role, both offensive and defensive, that has to provide reporting specifically would be more likely to provide reporting from the commercial tools but I understand both sides of the argument. At the end of the day, interviews and job searching in general is more of a game where you have to be strategic if you want to be successful because words have different meanings for different people and have to sell yourself to your interviewer(s).

    • @edinfoden650
      @edinfoden650 Před 2 lety +1

      @@JonGoodCyber .

  • @pramithsuresh9736
    @pramithsuresh9736 Před 3 lety +24

    To the point... no awkwards moments ... perfect tutotial

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      Thank you for the feedback and I'm glad that you enjoyed the video!

  • @mikailkaratas3508
    @mikailkaratas3508 Před 2 lety +6

    Thanks for the video! First time I am practicing this tool and it is pretty cool how they show you all vulnerabilities in your network with details.

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      Glad you enjoyed it! A tool like this will definitely open your eyes to what is on your network.

  • @karolinaristovska8143
    @karolinaristovska8143 Před 3 lety +6

    I just want to say thank you . This video was very helpful :)

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      Glad it was helpful and you are welcome!

  • @havocc611
    @havocc611 Před 3 lety +14

    Solid video, you'll grow your channel real well with videos like these. Remember me when you're famous.

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +3

      I'm glad you are enjoying the content and thank you for the feedback!

  • @PaulEllisBIGDATA
    @PaulEllisBIGDATA Před 3 lety +2

    Here's my comment for the youtube algo! thanks man. appreciate your channel.

  • @syedsajjadh.h.8383
    @syedsajjadh.h.8383 Před 3 lety +11

    Great video and well explained thanks ive learned something 👍

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      Thank you for the feedback and I'm glad I could help!

  • @Just7Music
    @Just7Music Před 2 lety +3

    Great content. I've learned a lot!!

  • @jacksibrizzi275
    @jacksibrizzi275 Před rokem +1

    Thank you. Perfect start.

  • @yaparker22
    @yaparker22 Před 2 lety

    I appreciate and enjoyed this video. Thanks.

  • @chesagrant4878
    @chesagrant4878 Před rokem +3

    This was so helpful!! Thank you

  • @newbreaker0403
    @newbreaker0403 Před 4 měsíci +1

    Thank you for the video! I'm preparing for the exam SC-900 and I am discovering new tools for penetration testing. And you are absolutely right, how I feel bad on not knowing all these tools ^^

    • @JonGoodCyber
      @JonGoodCyber  Před 2 měsíci +1

      I'm glad that you enjoyed the content! Stick with it and always keep learning.

  • @paulsmaglik5063
    @paulsmaglik5063 Před rokem +1

    Thank you for the explanation it will help me for my security plus test

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      Good luck and I'm happy that the content was helpful!

  • @shwethamohan7165
    @shwethamohan7165 Před rokem +1

    Tons of valuable info thank u very much Jon..❤

  • @mohammedsaleh2669
    @mohammedsaleh2669 Před 2 měsíci +2

    This was so helpful I learned a lot! Thank you dear!

  • @mbs4167
    @mbs4167 Před 2 lety +1

    I liked this video and this would be my second time using Nessus. I mostly use Kali Linux & Wireshark.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      Thank you for sharing and I'm glad that you enjoyed the video!

  • @cyberweapontime4067
    @cyberweapontime4067 Před 2 lety +1

    Thank you so much for headsup...

  • @crashHypnotize
    @crashHypnotize Před 3 měsíci +1

    Great concise information.

  • @JTvlogs984
    @JTvlogs984 Před 6 měsíci +1

    Amazing !! Thank you Sir Jon Good.

  • @daniaad3069
    @daniaad3069 Před 3 lety +1

    That was sooo helpful thxx

  • @iishadowii7477
    @iishadowii7477 Před 3 lety +9

    this is better than online college classes

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      Thank you for the feedback! I'm glad you enjoyed the video.

  • @yougaincomputers1080
    @yougaincomputers1080 Před 3 lety +3

    Great content

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      Thank you for the feedback and I'm glad you enjoyed the video!

  • @jonathanthomas6557
    @jonathanthomas6557 Před měsícem +1

    Thanks!

  • @supecalifraglisticspalladocius

    this makes CIS good to amplify

  • @pedropagan7811
    @pedropagan7811 Před rokem +1

    Thank you!

  • @Marva123
    @Marva123 Před rokem +1

    Thanks for the info

  • @kandimalla
    @kandimalla Před 2 lety +1

    Good one Jonno

  • @MywesternfatherAsianfath-pj4wq
    @MywesternfatherAsianfath-pj4wq Před 2 měsíci +1

    thank you sir

  • @josephinekwakye4495
    @josephinekwakye4495 Před 2 lety +1

    Thanks man

  • @Lakshmisowjanyacls
    @Lakshmisowjanyacls Před 2 lety +1

    Great video. What is your view over Qualys tool? and which one is better between Nessus and Qualys?

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      Thank you and I'm glad you enjoyed it! Nessus by itself doesn't really compare because it's just the vulnerability scanner and Qualys is more of full vulnerability management suite. Tenable's Security Center would be a closer comparison. It's been a few years since I've used Qualys but from what I remember it had a few more features than Security Center but either will get the job done.

  • @AnkitSharma-sc9jj
    @AnkitSharma-sc9jj Před 3 lety +2

    helpful video..

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      Thank you and I'm glad you enjoyed the video!

  • @Cyber_Levi
    @Cyber_Levi Před 4 měsíci +1

    Using this video to prepare for an upcoming security interview!

    • @JonGoodCyber
      @JonGoodCyber  Před 4 měsíci +2

      Awesome and let me know how it goes!

    • @Cyber_Levi
      @Cyber_Levi Před 4 měsíci +1

      @JonGoodCyber Hey Jon, this was my first cybersecurity interview. It didn't end in a job offer but i learned a lot and can't wait for my next interview. Wish i would've found your resources earlier

    • @JonGoodCyber
      @JonGoodCyber  Před 4 měsíci +2

      @@Cyber_Levi although not fun for an interview to not work out, learning is a huge part of the process! I'm glad that you found my content and that I get to be a part of your journey.

  • @k7ufo819
    @k7ufo819 Před 2 lety +1

    very useful, subscribing here.

  • @upengan78
    @upengan78 Před 3 lety +5

    Thank you!! Is there a difference between what is a vulnerability assessment and what is vulnerability management?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +7

      I'm glad you enjoyed the video! The major difference is that a vulnerability assessment will uncover vulnerabilities that exist but vulnerability management is the entire process of tracking the vulnerabilities through their lifecycle which might include their mitigation.

    • @upengan78
      @upengan78 Před 3 lety +1

      @@JonGoodCyber excellent. Thank you so much for that quick and informative feedback 🙏👍

  • @altheaunlocked
    @altheaunlocked Před 5 měsíci +1

    Thank you for the video, it was very informative. What do you suggest because the Nessus Essential version is no longer available

    • @JonGoodCyber
      @JonGoodCyber  Před 5 měsíci +1

      Nessus Essentials is still available, but it takes some Googling to find the right spot as Tenable has changed up some things on their website: www.tenable.com/products/nessus/nessus-essentials

  • @iliketurtles536
    @iliketurtles536 Před 2 lety +23

    Nessus does not determine the "MEDIUM" rating, its based off the CVSS Scoring tied to CVE/CVD. Otherwise great video!

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +12

      Thank you for the feedback! You are correct in that typically it's going to match whatever the CVE/CVD states. I left it a little open in how I stated it in the event that Tenable decides to do more research and make a severity judgement different from what researchers have determined. At the end of the day the severity might not be what is actually listed because a high vulnerability finding in one environment might not have the necessary dependencies in another environment...always validate results!

  • @dhruvilpatel1201
    @dhruvilpatel1201 Před 3 lety +12

    I'm in 10+2 and I'm into Webapp penetration testing. Started learning about CISSP for knowledge not cert because I don't have experience. Learning bug hunting aside and of course last year of my high school. Any suggestions for next path ?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +6

      Definitely start trying to pick up some programming if you can and focus on learning foundational knowledge about operating systems. Bug hunting is great but if you don't know the foundational stuff, you are going to struggle.

    • @dhruvilpatel1201
      @dhruvilpatel1201 Před 3 lety +2

      @@JonGoodCyber Ya actually, I'll start my programing in College. As of now I'm in High school where languages are not too much focused. Any other thing than programming?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +7

      There isn't really a reason why you can't start learning now. The key is you want to learn things that you can keep expanding on throughout the next several years. Operating system and networking basics...CCNA or Linux+ are probably the two major things I would recommend. You've got to be careful that you don't burn time learning things that you don't touch for another 6 years and then have to learn it all over again. That is why reason programming is useful at this point in your life.

  • @aleksjagger9770
    @aleksjagger9770 Před rokem +1

    Nice one.

  • @MMcFarland-re5zk
    @MMcFarland-re5zk Před 17 dny

    Q informative 👌

  • @neilspector9221
    @neilspector9221 Před rokem +1

    I also use SCAP compliance checker to scan assets.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      Thanks for sharing! SCAP by nature isn't a vulnerability scanner, it's a configuration checker, but with that being said, you can do limited vulnerability scanning if you're on a shoestring budget. Knowing how to use SCAP in specific environments can be extremely useful.

  • @dhruvilpatel1201
    @dhruvilpatel1201 Před 3 lety +6

    I've completed my 16 years (age). What should I focus into ? I have bit knowledge in Security compliance and controls,CISSP and web app. What next should I focus more ?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +5

      I would really focus on building up your foundational technical skills. Operating system knowledge for Windows and Linux is going to be crucial. Also, if you can pick up some programming knowledge it would be helpful and put you ahead of your peers.

  • @zainsyed4372
    @zainsyed4372 Před 2 lety +2

    Great Video!! I was just confused about If SCAP or OpenScap also an alternative to Nessus?

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      Those are definitely alternative options but I probably wouldn't recommend them over Nessus unless you are on a tight budget.

    • @zainsyed4372
      @zainsyed4372 Před 2 lety +1

      @@JonGoodCyber Thank you Jon! I am new to security so trying to learn about different tools!

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      Then yes I would definitely look at all the tools that you can! The great thing is that most tools in the same category perform in a similar way so if you learn one, it's fairly easy to learn another.

  • @jidalhassantana
    @jidalhassantana Před 2 lety +2

    Thanks for your vídeo and for speak slowly. I'm not fluent but I could understood evrything that you said.

  • @kcalderon03
    @kcalderon03 Před 3 lety +2

    Does the Nessus basic network scan. Scan applications by default? Or is their box I need to check. Running Nessus pro. Thanks

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +4

      For this video I installed Apache and it did perform scanning (at 9:30) on it however it will be a lighter scan in general. There is a specific web application scanning policy that you can use.

  • @musshare
    @musshare Před 2 lety +1

    Thank you for the tutorial.
    New-be in cyber security. What skills should i be looking at in order to land that job without any certs yet

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      I'm glad that you enjoyed it! Honestly, landing a job in Cyber Security without any certifications, especially at the entry level, is going to be pretty challenging. Remember that the career field is on fire right now so you should try to set yourself apart from the crowd as much as possible. With that being said, in my free eBook ( www.jongood.com/getstarted/ ) I walk through all of the things that you should be learning to prepare yourself.

    • @musshare
      @musshare Před 2 lety +1

      @@JonGoodCyber how do I contact you personally.. Some personal questions to ask.

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      Career Coaching ( www.jongood.com/services/ ) is the best way to get 1:1 advice for your specific situation.

    • @musshare
      @musshare Před 2 lety +1

      @@JonGoodCyber thank you

  • @yunusbahar6939
    @yunusbahar6939 Před 2 lety +1

    hi Jon, is it nessus can be used to check VA in Mobile application (React Native)

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      As long as Nessus has a plugin for what you're scanning ( www.tenable.com/plugins ), it will pick up vulnerabilities. Nessus IS NOT however a code scanning tool so it will not perform an analysis on your source code or perform dynamic testing without a plugin.

  • @Okikor1
    @Okikor1 Před 11 měsíci +1

    Could you tell me some of the good systems you've used for patching and remediation?

    • @JonGoodCyber
      @JonGoodCyber  Před 11 měsíci +2

      SCCM is very popular in Windows environments but in all honesty, there are tons of them out there. Gartner is a pretty good place to start if you're looking for top industry choices.

  • @subscriberschoice1866
    @subscriberschoice1866 Před 3 lety +1

    Sir can you please tell about how to prepare ourselves for bug bounty. What are the skills we need to learn for it. Thank you.

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      I would recommend checking out this book ( amzn.to/3eCu6rs ) to get started learning about bug hunting.

  • @abhishekdeore6068
    @abhishekdeore6068 Před rokem +1

    We can use nmap to scan ports as well as to find Vulnerabilities

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      You certainly can use nmap to help identify vulnerabilities. With that being said, keep in mind that nmap specifically has limited capabilities when it comes to vulnerability scanning because that's not it's primary function.

  • @taohuang6535
    @taohuang6535 Před 3 lety +1

    What is the difference between vulnerability scanner and penetration tester?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +4

      Think of a scanner as just checking the surface to see if known vulnerability conditions exist even though they might not actually be exploitable versus a penetration test that will attempt to exploit the vulnerabilities. Scanners are also automated tools compared to penetration testing which might involve manual tests that could exploit business/application logic.

  • @Kobifans
    @Kobifans Před rokem +1

    Hi, for IPV6, is this reliable? Also, since this is a free version, do IPV6 scans on CPEs consume a large chunk on the free IPs?

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +2

      Many tools aren't really optimized for IPv6 so your experience may vary but Nessus does support IPv6 ( docs.tenable.com/nessus/Content/IPv6Support.htm ). There's no difference in consumption between an IPv6 address and an IPv4 address because it's still a single address.

    • @Kobifans
      @Kobifans Před rokem

      @@JonGoodCyber appreciated Jon!

  • @hdhhd7414
    @hdhhd7414 Před 2 lety +1

    good 1

  • @DanielChiagozie
    @DanielChiagozie Před 4 měsíci

    please what command prompt did you use while installing Nessus? is it the normal computer command prompt?

    • @JonGoodCyber
      @JonGoodCyber  Před 4 měsíci +2

      I recommend rewatching the video because every step of the process is detailed in this video including the operating system and commands that I used.

  • @johnvardy9559
    @johnvardy9559 Před rokem +1

    Snort using on every day tasks or there are better Tools?

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +2

      What do you mean by every day tasks? I'm assuming this is for learning purposes...Snort is an IDS / IPS so you aren't necessarily going to get a ton of value from it unless you're attempting to do malicious activities or having attempted attacks that will trigger alerts.

  • @randallcharlestuckermrcyse1479

    I Will Not Scan Networks That I Do Not Have Written Permission To Scan. I agree. I did it verbally as well as a Verbal Contract with the Universe. Luckily I will be doing Bug Bounties, so this will help.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +2

      Verbal agreements are never legally binding and at the rate that people are being prosecuted, I would make sure to have all agreements in writing.

    • @randallcharlestuckermrcyse1479
      @randallcharlestuckermrcyse1479 Před rokem +1

      @@JonGoodCyber The bug bounty program offered by HackerOne, seems promising.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      HackerOne and BugCrowd are two of the most popular bug bounty platforms.

    • @randallcharlestuckermrcyse1479
      @randallcharlestuckermrcyse1479 Před rokem +1

      @@JonGoodCyber Also thanks for the info on that one. Once I am able to get a Cyber Security Job, because I am in school for CS. IF anyone asked me to pentest their security I would ask them to write up a contract with a lawyer, so both parties are safe and I have a history of Hacktivism(Not proud of it), so I understand the otherside. I am trying to gain a good reputation from my bad reputation. I believe Bug Bounties is a good way to do that too.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      Bug bounty programs are definitely a way to positively contribute to companies and they can help show that you've changed your ways. Some people are so good at finding bugs that they don't even want to work for companies because of how much they earn but of course that is a small percentage of the researchers since it's a race to find the bugs.

  • @obaidebrahim
    @obaidebrahim Před 2 lety +1

    IBM App scan is a good tools and give you best Repot

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      There are many different scanning tool options out on the market with each having pros and cons. The nice thing is that once you learn one tool, you can pretty easily learn another tool.

  • @vq8gef32
    @vq8gef32 Před rokem +2

    john any good open source Vulnerability Scanner ? Nessus is good but can't effort it. :)

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +2

      Are you talking about for home use? You can also get the home use license from Tenable for Nessus. Otherwise, OpenVAS ( www.openvas.org/ ) is pretty popular. You can also use nmap but keep in mind that its scanning functionality is fairly limited.

    • @vq8gef32
      @vq8gef32 Před rokem +1

      @@JonGoodCyber Thank you John looking at it.

  • @synthesiapianotutorials3700

    here's a comment! dont try to make us do 30 things before even watching the video please! but your honesty was much appreciated as you stated it was for the al.... to raise your video! leaved a sub

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      I try to balance it because I want to remind people but not overwhelm them...thank you for watching!

  • @johnatugba4789
    @johnatugba4789 Před 3 lety +3

    Nikto is another substitute to Nessus

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      Nikto can definitely provide value when it comes to web application vulnerabilities.

  • @uche2564
    @uche2564 Před 3 lety +1

    Have you heard of splunk and burpsuite?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      Yes, both tools are extremely popular in enterprises of all sizes.

  • @deadx5581
    @deadx5581 Před 2 lety +1

    Can you please tell me how much false positive rate does nessus generate?

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      It's impossible to give an accuracy rate because there are so many factors that go into that including how the actual system being scanned is configured. With that being said, scanners still drastically improve your ability to find vulnerabilities, especially if you are doing credentialed scans.

    • @deadx5581
      @deadx5581 Před 2 lety +1

      @@JonGoodCyber appreciate your response. I am a newbie in terms of cyber sec. Aspects... Can u tell me how should one generate a detailed report of vulnerability assessment in nessus ?

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      The results that I show in this video will provide you detailed information or you can also use the "Report" or "Export" option depending on what you are trying to accomplish.

  • @fyodor8008
    @fyodor8008 Před 2 lety +1

    Does Nessus require an account to run? I'm helping a friend do a lab on it right now

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      You need to get an activation key from Tenable in order to run the software. In order to perform scans you can run them without login credentials or using credentialed scans. The main difference is that credentialed scans will be able to perform more accurate scans.

    • @fyodor8008
      @fyodor8008 Před 2 lety +1

      @@JonGoodCyber What do you mean by more accurate scans? Are you talking about how nmap only works with a couple options if you run it without sudo?
      Credentialed scans can access the raw data packets on the interfaces, right? Whereas non-credentialed ones will not allow packet crafting, OS identification, or stealth scans?
      Is that what you're saying?

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +3

      A non-credentialed scan is similar to what an attacker would see where it might not give the full story and a credentialed scan is like a privileged user logged into the system that can see a lot more. Check out the article to learn more about the differences: www.beyondtrust.com/resources/glossary/vulnerability-scanning#:~:text=Non-credentialed%20scans%2C%20as%20the,the%20systems%20they%20are%20scanning.&text=On%20the%20other%20hand%2C%20credentialed,eye%20view%20of%20the%20environment.

  • @RaymondJonesrejlive
    @RaymondJonesrejlive Před rokem +1

    Good thing I was able to use my school email because gmail and yahoo emails arent allowed for sign up.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      Yeah I've seen a lot of companies cracking down on free service email addresses. Unfortunately that makes it difficult if you want to try a product or service for legitimate reasons.

  • @jimgaba425
    @jimgaba425 Před 6 měsíci +1

    How can I get a copy of Nessus Essentials - Not on their site anymore

    • @JonGoodCyber
      @JonGoodCyber  Před 6 měsíci +1

      Unfortunately that happens eventually with any vendor and their products. I searched on Google and found it on their website: www.tenable.com/products/nessus/nessus-essentials

    • @jimgaba425
      @jimgaba425 Před 6 měsíci +1

      Thank you - This was has the free version in the installer

  • @Egimatic
    @Egimatic Před 3 lety +2

    What linux distro is that

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      Cent OS although installation across all Linux distributions is pretty similar.

  • @DrGPaw007
    @DrGPaw007 Před 3 lety +1

    Is there a 64 bit Nessus install - i can only find 32bit for windows 10

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      I see a 64-bit version towards the bottom of the download list ( www.tenable.com/downloads/nessus?loginAttempted=true ).

    • @DrGPaw007
      @DrGPaw007 Před 3 lety +1

      @@JonGoodCyberthanks

  • @rogierbakker5110
    @rogierbakker5110 Před 7 měsíci +1

    Nessus expot import in TOPdesk?

    • @JonGoodCyber
      @JonGoodCyber  Před 7 měsíci +2

      You'll have to look at the available export options and see if something fit your needs or if an integration exists. There's also ways to interact with the Nessus APIs but it all depends on your needs.

  • @hemanthk6960
    @hemanthk6960 Před rokem +1

    Thanks a lot sir..

  • @boardworker5138
    @boardworker5138 Před rokem +1

    It appears there's no more Tenable "Essentials", just free trials of Pro and Expert. At least I can't find the download for Essentials.

    • @boardworker5138
      @boardworker5138 Před rokem

      I take that back. They hid it really well. Search for the blog changing "home" to "essentials" and you'll get the link.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      You can try the downloads page ( www.tenable.com/downloads/nessus?loginAttempted=true ) along with an Activation Code request ( www.tenable.com/products/nessus/nessus-essentials?action=register ) but yeah they've made it way harder to get. I did see that you can do a trial with the Pro version too.

  • @Crazy--Clown
    @Crazy--Clown Před 3 lety +1

    Dude you said smash the like button, well I did and I have a touch screen with a crack in it now. What will be the process for you to organise repair? It will be for a display replacement. My lawyer advised me to ask you first.

  • @dylaneasley4943
    @dylaneasley4943 Před rokem +1

    When I run it, it only says "Register Offline". Anyone know how to fix this?

  • @nesgadol881
    @nesgadol881 Před 3 lety +1

    Does this tool detect hidden crypto mining code?

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      Nessus will detect software that has known and reported vulnerabilities. These will typically have a CVE and can be found in databases such as the one from NIST ( nvd.nist.gov/ ). The purpose of Nessus isn't to detect or inventory software although it could bring to light software you didn't know you had or forgot about.

  • @GAPSGraham
    @GAPSGraham Před 2 lety +1

    One alternative is openVas

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      For learning, OpenVAS is definitely an alternative to play around with but in a commercial environment, I would never recommend it unless you had absolutely zero dollars for your budget.

  • @user-px7mu3wx4m
    @user-px7mu3wx4m Před 2 lety +1

    nessus error activation failed. WHY?

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      I recommend checking out this article: community.tenable.com/s/article/Verify-Connection-to-the-Plugin-and-Activation-Server

  • @syeduroojkamal4986
    @syeduroojkamal4986 Před 3 lety +1

    real estate diss track gone wrong at 3:00 AM

  • @tony-thefiglovinstargazer

    👍

  • @erhansaygin9390
    @erhansaygin9390 Před 2 lety +1

    Thanks man, but you did not talk about the reporting.

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      I'm glad that you enjoyed the video! The focus of this video was on the operational installation and usage of Nessus so reporting was outside of this video's scope. Typically if there are concerns with actual reports, companies will migrate to Tenable's Security Center (or a similar product) that offers much more robust reporting capabilities since standalone Nessus reports aren't amazing at scale. With that being said, if I receive enough interest then I will look at adding a follow up video.

  • @generalchannel5926
    @generalchannel5926 Před 2 lety +1

    Sir I am WORKING in soc how to run Nessus when I am in project coz that's not gonna be my personal system . So how to run it

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      This video details how to operate Nessus so I'm not exactly sure what you are asking.

  • @etynurlaila5711
    @etynurlaila5711 Před 2 lety +1

    How to get activation code?

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +2

      I cover that starting at 4:58 in the video.

  • @poshsincebirth898
    @poshsincebirth898 Před 2 lety +2

    sheeeesh

  • @IAmCandal
    @IAmCandal Před 2 lety +1

    expensive

    • @JonGoodCyber
      @JonGoodCyber  Před 2 lety +1

      What's expensive? The version for home use is free.

  • @irfanaffandys
    @irfanaffandys Před 3 lety +2

    Your super secret password is 1234 isn't it? :p

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      You got me...now I'll have to change it again.

  • @thepast2007
    @thepast2007 Před 3 lety +1

    I have CURRENT Scan any browser Firefox Chromium I Get result Current 😡😡😡

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      Any issues with the tool itself should be directed to the developers so that they can fix them.

  • @manfrombritain6816
    @manfrombritain6816 Před 2 lety +2

    wtf is PPD doing teaching Nessus instead of dota

  • @akshaykulkarni1301
    @akshaykulkarni1301 Před 2 měsíci +1

    user name is root and the password would be super secret. #root ;) ;P

  • @manthing1467
    @manthing1467 Před 3 lety +1

    algo

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +1

      Thank you for the support and I'm glad you enjoyed the video!

  • @MrDabado
    @MrDabado Před 3 lety +1

    4 minutes into the video and you still did not start with the tutorial,

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +2

      There are timestamps in the video if you simply want the tutorial steps, however the rest of the information is valuable for professionals in the industry.

  • @666og
    @666og Před 3 lety +3

    this video could be a lot shorter, dislike

    • @JonGoodCyber
      @JonGoodCyber  Před 3 lety +11

      Thank you for the feedback. Unfortunately with any tutorial or procedural documentation, you have to assume that people are at ground zero which is why the video has some subjects that might be considered quite basic. I did include timestamps for those who want to go directly to certain parts of the video.

    • @simplyswallow9972
      @simplyswallow9972 Před 3 lety +3

      Did a good job Jon even if it is longer than this. People will always seek excuses unnecessarily. Do yours and let's watch. As advised, goto time stamps if you feel you don't need the preamble. Thanks

  • @DarkCode
    @DarkCode Před rokem +1

    Do you have an updated video? this is outdated based on the website you provided.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +2

      Are you referring to the Tenable website that they seem to have recently updated? I'm assuming that's the case because they've made it impossible to find the free version. I will look through the video to see if there are any other changes but from what I see so far, that's been the only change. For right now, a simple google search for "Nessus Essentials" will still bring up the correct page ( www.tenable.com/products/nessus/nessus-essentials ). Thanks for letting me know!

    • @DarkCode
      @DarkCode Před rokem +1

      @@JonGoodCyber I’ll check it out later today thanks for post. By the way do you know how I can do network scans legally? Any suggestions? I’m trying to learn this for Cybersecurity before I get entry level.

    • @JonGoodCyber
      @JonGoodCyber  Před rokem +1

      The best strategy of systems to scan is to build a home lab (see my videos on this). Never scan systems that you don't own or have written permission (contract) from the owner.

  • @internetmemeplace6886
    @internetmemeplace6886 Před 10 měsíci +1

    Wth is the root stuff

    • @JonGoodCyber
      @JonGoodCyber  Před 10 měsíci +1

      Per Google, "Root is the superuser account in Unix and Linux. It is a user account for administrative purposes, and typically has the highest access rights on the system."

  • @ashishjadhav5169
    @ashishjadhav5169 Před 11 měsíci +1

    Metaspolit with arimgaten (gui) it just automated everything

    • @JonGoodCyber
      @JonGoodCyber  Před 11 měsíci +1

      Thanks for sharing! There are certainly ways to automate a lot of things but for example, it doesn't always make sense to allow a tool like Metasploit on a network, especially if you aren't conducting a penetration test. Also, I believe you mean Armitage.