Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)

Поделиться
HTML-код
  • Опубликовано: 16 июн 2024
  • How do you detect vulnerabilities that exist in a network or on a system?
    Start learning Cybersecurity today ➡️ www.cybertrainingpro.com/
    The ability to identify vulnerabilities and to track them throughout their life cycle is crucial to maintaining a secure network. According to the CIS 20 Controls, Continuous Vulnerability Management is the third most important and basic control that you should have in your network. Unfortunately, vulnerability detection and vulnerability management can be two very time-consuming processes in Cyber Security. Luckily, there are tools that we can use to automate the discovery process. Nessus is arguably the most well-known vulnerability scanning tool in the market. As a result, if there is one scanner you should be familiar with then it’s Nessus.
    In this video, we will walk through the Nessus Vulnerability Scanner. We will cover everything from the installation process and running your first vulnerability scan. I highly encourage you to follow along in your home lab to help build your skills with Nessus. Remember you should only scan networks that you have WRITTEN authorization to do so.
    Nessus Essentials Download: www.tenable.com/products/ness...
    Practical Vulnerability Management: amzn.to/30JphEa
    Vulnerability Management: amzn.to/2ZXhfbk
    Security Risk Management: amzn.to/3jFjXtW
    =============================
    Today’s Video Sponsor
    =============================
    Are you interested in sponsoring content? ➡️ jongood.com/sponsor
    =============================
    Popular Cybersecurity Resources
    =============================
    Getting Started Resources & Free eBook ➡️ www.jongood.com/getstarted/
    Cybersecurity Q&A ➡️ • Cyber Security Q&A
    Cybersecurity Projects ➡️ • Cyber Security Projects
    Cybersecurity Training & Career Services ➡️ www.CyberTrainingPro.com/
    =============================
    Cool Tech that I Use in My Studio
    =============================
    Gear List ➡️ jongood.com/affiliates/amazon/
    =============================
    Connect with me!
    =============================
    LinkedIn: ➡︎ / jongoodcyber
    Twitter: ➡︎ / jongoodcyber
    Instagram: ➡︎ / jongoodcyber
    ⏰ Timecodes ⏰
    0:00 Introduction
    1:25 CIS Top 20 Controls
    2:28 Nessus Introduction
    3:51 Nessus Installation
    8:03 Discovery Scan
    8:31 Basic Nessus Scan
    8:58 Review Findings
    10:49 CVE Findings
    11:49 Question of the Day
    12:03 Final Comments
    =============================
    #TenableNessus #VulnerabilityManagement #VulnerabilityScanner
    DISCLAIMER: I am an ambassador or affiliate for many brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.
    DISCLAIMER (MUSIC): I only use royalty-free music and sound effects.
  • НаукаНаука

Комментарии • 225

  • @JonGoodCyber
    @JonGoodCyber  3 года назад +25

    Here are some related learning resources:
    Practical Vulnerability Management: amzn.to/30JphEa
    Vulnerability Management: amzn.to/2ZXhfbk
    Security Risk Management: amzn.to/3jFjXtW

    • @ericmalaba6540
      @ericmalaba6540 3 года назад +1

      i try to download nessus with my gmail ac count doesn't work, what sould i do please ?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      I am not sure why you would be having problems with gmail. I would try reaching out to Tenable.

  • @Jupiterxice
    @Jupiterxice 2 года назад +57

    Nessus is so easy it does all the work for you. Funny thing at a Job interview I said I used Nmap and they thought I had no experience in vulnerability scanning

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +12

      Unfortunately, vulnerability scanners aren't always accurate and frequently will report false positives but they do help shorten the discovery process. I'm not surprised about that happening with nmap since people generally expect to hear about the major commercial products like Nessus. It seems a little random to not have any experience with tools like Nessus or OpenVAS if you are tinkering around with finding vulnerabilities using nmap though. That is a good example of why you need to assume an interviewer doesn't have much practical knowledge and explain things until that is proven otherwise.

    • @Jupiterxice
      @Jupiterxice 2 года назад +4

      @@JonGoodCyber bruh I had to adjust him and say to him yes I had experiment with nessus but in under grad. Smh I come from a pen tester perspective. Smh I can tell various ISSOs at my job going to have a rude awakening how I can show them how vulnerability scanning can be done

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +19

      To be fair, nmap is very limited in vulnerability detection. The primary purpose of nmap isn't vulnerability detection even though we can identify potential attack vectors based on the information, although a crafty admin could change the banners and make things more challenging. In any role, both offensive and defensive, that has to provide reporting specifically would be more likely to provide reporting from the commercial tools but I understand both sides of the argument. At the end of the day, interviews and job searching in general is more of a game where you have to be strategic if you want to be successful because words have different meanings for different people and have to sell yourself to your interviewer(s).

    • @edinfoden650
      @edinfoden650 2 года назад +1

      @@JonGoodCyber .

  • @pramithsuresh9736
    @pramithsuresh9736 3 года назад +24

    To the point... no awkwards moments ... perfect tutotial

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      Thank you for the feedback and I'm glad that you enjoyed the video!

  • @henryufuomaogboru5310
    @henryufuomaogboru5310 25 дней назад +2

    Your video just simplified the use of nessus for me. Thanks a million, Bro.

    • @JonGoodCyber
      @JonGoodCyber  25 дней назад +1

      Glad to hear that and you are welcome!

  • @mikailkaratas3508
    @mikailkaratas3508 2 года назад +5

    Thanks for the video! First time I am practicing this tool and it is pretty cool how they show you all vulnerabilities in your network with details.

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      Glad you enjoyed it! A tool like this will definitely open your eyes to what is on your network.

  • @havocc611
    @havocc611 3 года назад +13

    Solid video, you'll grow your channel real well with videos like these. Remember me when you're famous.

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +3

      I'm glad you are enjoying the content and thank you for the feedback!

  • @PaulEllisBIGDATA
    @PaulEllisBIGDATA 3 года назад +1

    Here's my comment for the youtube algo! thanks man. appreciate your channel.

  • @karolinaristovska8143
    @karolinaristovska8143 3 года назад +5

    I just want to say thank you . This video was very helpful :)

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      Glad it was helpful and you are welcome!

  • @syedsajjadh.h.8383
    @syedsajjadh.h.8383 3 года назад +10

    Great video and well explained thanks ive learned something 👍

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      Thank you for the feedback and I'm glad I could help!

  • @newbreaker0403
    @newbreaker0403 4 месяца назад +1

    Thank you for the video! I'm preparing for the exam SC-900 and I am discovering new tools for penetration testing. And you are absolutely right, how I feel bad on not knowing all these tools ^^

    • @JonGoodCyber
      @JonGoodCyber  2 месяца назад +1

      I'm glad that you enjoyed the content! Stick with it and always keep learning.

  • @jacksibrizzi275
    @jacksibrizzi275 Год назад +1

    Thank you. Perfect start.

  • @mohammedsaleh2669
    @mohammedsaleh2669 2 месяца назад +2

    This was so helpful I learned a lot! Thank you dear!

  • @chesagrant4878
    @chesagrant4878 Год назад +3

    This was so helpful!! Thank you

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      Glad it was helpful and you're welcome!

  • @Just7Music
    @Just7Music 2 года назад +3

    Great content. I've learned a lot!!

  • @paulsmaglik5063
    @paulsmaglik5063 Год назад +1

    Thank you for the explanation it will help me for my security plus test

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      Good luck and I'm happy that the content was helpful!

  • @shwethamohan7165
    @shwethamohan7165 11 месяцев назад +1

    Tons of valuable info thank u very much Jon..❤

  • @yaparker22
    @yaparker22 2 года назад

    I appreciate and enjoyed this video. Thanks.

  • @mbs4167
    @mbs4167 Год назад +1

    I liked this video and this would be my second time using Nessus. I mostly use Kali Linux & Wireshark.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      Thank you for sharing and I'm glad that you enjoyed the video!

  • @cyberweapontime4067
    @cyberweapontime4067 2 года назад +1

    Thank you so much for headsup...

  • @JTvlogs984
    @JTvlogs984 6 месяцев назад +1

    Amazing !! Thank you Sir Jon Good.

  • @crashHypnotize
    @crashHypnotize 2 месяца назад +1

    Great concise information.

  • @daniaad3069
    @daniaad3069 3 года назад +1

    That was sooo helpful thxx

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Glad it helped and you are welcome!

  • @iishadowii7477
    @iishadowii7477 3 года назад +9

    this is better than online college classes

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Thank you for the feedback! I'm glad you enjoyed the video.

  • @supecalifraglisticspalladocius
    @supecalifraglisticspalladocius 2 года назад +1

    this makes CIS good to amplify

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      I'm glad that you enjoyed the video!

  • @jonathanthomas6557
    @jonathanthomas6557 Месяц назад +1

    Thanks!

  • @yougaincomputers1080
    @yougaincomputers1080 3 года назад +3

    Great content

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Thank you for the feedback and I'm glad you enjoyed the video!

  • @Marva123
    @Marva123 Год назад +1

    Thanks for the info

  • @Cyber_Levi
    @Cyber_Levi 4 месяца назад +1

    Using this video to prepare for an upcoming security interview!

    • @JonGoodCyber
      @JonGoodCyber  4 месяца назад +2

      Awesome and let me know how it goes!

    • @Cyber_Levi
      @Cyber_Levi 4 месяца назад +1

      @JonGoodCyber Hey Jon, this was my first cybersecurity interview. It didn't end in a job offer but i learned a lot and can't wait for my next interview. Wish i would've found your resources earlier

    • @JonGoodCyber
      @JonGoodCyber  3 месяца назад +2

      @@Cyber_Levi although not fun for an interview to not work out, learning is a huge part of the process! I'm glad that you found my content and that I get to be a part of your journey.

  • @pedropagan7811
    @pedropagan7811 Год назад +1

    Thank you!

  • @upengan78
    @upengan78 3 года назад +5

    Thank you!! Is there a difference between what is a vulnerability assessment and what is vulnerability management?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +7

      I'm glad you enjoyed the video! The major difference is that a vulnerability assessment will uncover vulnerabilities that exist but vulnerability management is the entire process of tracking the vulnerabilities through their lifecycle which might include their mitigation.

    • @upengan78
      @upengan78 3 года назад +1

      @@JonGoodCyber excellent. Thank you so much for that quick and informative feedback 🙏👍

  • @josephinekwakye4495
    @josephinekwakye4495 2 года назад +1

    Thanks man

  • @jidalhassantana
    @jidalhassantana 2 года назад +2

    Thanks for your vídeo and for speak slowly. I'm not fluent but I could understood evrything that you said.

  • @Lakshmisowjanyacls
    @Lakshmisowjanyacls 2 года назад +1

    Great video. What is your view over Qualys tool? and which one is better between Nessus and Qualys?

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      Thank you and I'm glad you enjoyed it! Nessus by itself doesn't really compare because it's just the vulnerability scanner and Qualys is more of full vulnerability management suite. Tenable's Security Center would be a closer comparison. It's been a few years since I've used Qualys but from what I remember it had a few more features than Security Center but either will get the job done.

  • @MywesternfatherAsianfath-pj4wq
    @MywesternfatherAsianfath-pj4wq Месяц назад +1

    thank you sir

  • @kandimalla
    @kandimalla 2 года назад +1

    Good one Jonno

  • @neilspector9221
    @neilspector9221 Год назад +1

    I also use SCAP compliance checker to scan assets.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      Thanks for sharing! SCAP by nature isn't a vulnerability scanner, it's a configuration checker, but with that being said, you can do limited vulnerability scanning if you're on a shoestring budget. Knowing how to use SCAP in specific environments can be extremely useful.

  • @k7ufo819
    @k7ufo819 2 года назад +1

    very useful, subscribing here.

  • @aleksjagger9770
    @aleksjagger9770 Год назад +1

    Nice one.

  • @altheaunlocked
    @altheaunlocked 4 месяца назад +1

    Thank you for the video, it was very informative. What do you suggest because the Nessus Essential version is no longer available

    • @JonGoodCyber
      @JonGoodCyber  4 месяца назад +1

      Nessus Essentials is still available, but it takes some Googling to find the right spot as Tenable has changed up some things on their website: www.tenable.com/products/nessus/nessus-essentials

  • @AnkitSharma-sc9jj
    @AnkitSharma-sc9jj 3 года назад +2

    helpful video..

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Thank you and I'm glad you enjoyed the video!

  • @iliketurtles536
    @iliketurtles536 2 года назад +23

    Nessus does not determine the "MEDIUM" rating, its based off the CVSS Scoring tied to CVE/CVD. Otherwise great video!

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +12

      Thank you for the feedback! You are correct in that typically it's going to match whatever the CVE/CVD states. I left it a little open in how I stated it in the event that Tenable decides to do more research and make a severity judgement different from what researchers have determined. At the end of the day the severity might not be what is actually listed because a high vulnerability finding in one environment might not have the necessary dependencies in another environment...always validate results!

  • @zainsyed4372
    @zainsyed4372 2 года назад +2

    Great Video!! I was just confused about If SCAP or OpenScap also an alternative to Nessus?

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      Those are definitely alternative options but I probably wouldn't recommend them over Nessus unless you are on a tight budget.

    • @zainsyed4372
      @zainsyed4372 2 года назад +1

      @@JonGoodCyber Thank you Jon! I am new to security so trying to learn about different tools!

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      Then yes I would definitely look at all the tools that you can! The great thing is that most tools in the same category perform in a similar way so if you learn one, it's fairly easy to learn another.

  • @dhruvilpatel1201
    @dhruvilpatel1201 3 года назад +6

    I've completed my 16 years (age). What should I focus into ? I have bit knowledge in Security compliance and controls,CISSP and web app. What next should I focus more ?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +5

      I would really focus on building up your foundational technical skills. Operating system knowledge for Windows and Linux is going to be crucial. Also, if you can pick up some programming knowledge it would be helpful and put you ahead of your peers.

  • @dhruvilpatel1201
    @dhruvilpatel1201 3 года назад +12

    I'm in 10+2 and I'm into Webapp penetration testing. Started learning about CISSP for knowledge not cert because I don't have experience. Learning bug hunting aside and of course last year of my high school. Any suggestions for next path ?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +6

      Definitely start trying to pick up some programming if you can and focus on learning foundational knowledge about operating systems. Bug hunting is great but if you don't know the foundational stuff, you are going to struggle.

    • @dhruvilpatel1201
      @dhruvilpatel1201 3 года назад +2

      @@JonGoodCyber Ya actually, I'll start my programing in College. As of now I'm in High school where languages are not too much focused. Any other thing than programming?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +7

      There isn't really a reason why you can't start learning now. The key is you want to learn things that you can keep expanding on throughout the next several years. Operating system and networking basics...CCNA or Linux+ are probably the two major things I would recommend. You've got to be careful that you don't burn time learning things that you don't touch for another 6 years and then have to learn it all over again. That is why reason programming is useful at this point in your life.

  • @musshare
    @musshare 2 года назад +1

    Thank you for the tutorial.
    New-be in cyber security. What skills should i be looking at in order to land that job without any certs yet

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      I'm glad that you enjoyed it! Honestly, landing a job in Cyber Security without any certifications, especially at the entry level, is going to be pretty challenging. Remember that the career field is on fire right now so you should try to set yourself apart from the crowd as much as possible. With that being said, in my free eBook ( www.jongood.com/getstarted/ ) I walk through all of the things that you should be learning to prepare yourself.

    • @musshare
      @musshare 2 года назад +1

      @@JonGoodCyber how do I contact you personally.. Some personal questions to ask.

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      Career Coaching ( www.jongood.com/services/ ) is the best way to get 1:1 advice for your specific situation.

    • @musshare
      @musshare 2 года назад +1

      @@JonGoodCyber thank you

  • @MMcFarland-re5zk
    @MMcFarland-re5zk 11 дней назад

    Q informative 👌

    • @JonGoodCyber
      @JonGoodCyber  11 дней назад +1

      I'm glad that you enjoyed the content!

  • @synthesiapianotutorials3700
    @synthesiapianotutorials3700 2 года назад +1

    here's a comment! dont try to make us do 30 things before even watching the video please! but your honesty was much appreciated as you stated it was for the al.... to raise your video! leaved a sub

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      I try to balance it because I want to remind people but not overwhelm them...thank you for watching!

  • @abhishekdeore6068
    @abhishekdeore6068 Год назад +1

    We can use nmap to scan ports as well as to find Vulnerabilities

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      You certainly can use nmap to help identify vulnerabilities. With that being said, keep in mind that nmap specifically has limited capabilities when it comes to vulnerability scanning because that's not it's primary function.

  • @Okikor1
    @Okikor1 10 месяцев назад +1

    Could you tell me some of the good systems you've used for patching and remediation?

    • @JonGoodCyber
      @JonGoodCyber  10 месяцев назад +2

      SCCM is very popular in Windows environments but in all honesty, there are tons of them out there. Gartner is a pretty good place to start if you're looking for top industry choices.

  • @randallcharlestuckermrcyse1479
    @randallcharlestuckermrcyse1479 Год назад +1

    I Will Not Scan Networks That I Do Not Have Written Permission To Scan. I agree. I did it verbally as well as a Verbal Contract with the Universe. Luckily I will be doing Bug Bounties, so this will help.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +2

      Verbal agreements are never legally binding and at the rate that people are being prosecuted, I would make sure to have all agreements in writing.

    • @randallcharlestuckermrcyse1479
      @randallcharlestuckermrcyse1479 Год назад +1

      @@JonGoodCyber The bug bounty program offered by HackerOne, seems promising.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      HackerOne and BugCrowd are two of the most popular bug bounty platforms.

    • @randallcharlestuckermrcyse1479
      @randallcharlestuckermrcyse1479 Год назад +1

      @@JonGoodCyber Also thanks for the info on that one. Once I am able to get a Cyber Security Job, because I am in school for CS. IF anyone asked me to pentest their security I would ask them to write up a contract with a lawyer, so both parties are safe and I have a history of Hacktivism(Not proud of it), so I understand the otherside. I am trying to gain a good reputation from my bad reputation. I believe Bug Bounties is a good way to do that too.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      Bug bounty programs are definitely a way to positively contribute to companies and they can help show that you've changed your ways. Some people are so good at finding bugs that they don't even want to work for companies because of how much they earn but of course that is a small percentage of the researchers since it's a race to find the bugs.

  • @kcalderon03
    @kcalderon03 3 года назад +2

    Does the Nessus basic network scan. Scan applications by default? Or is their box I need to check. Running Nessus pro. Thanks

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +4

      For this video I installed Apache and it did perform scanning (at 9:30) on it however it will be a lighter scan in general. There is a specific web application scanning policy that you can use.

  • @subscriberschoice1866
    @subscriberschoice1866 3 года назад +1

    Sir can you please tell about how to prepare ourselves for bug bounty. What are the skills we need to learn for it. Thank you.

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      I would recommend checking out this book ( amzn.to/3eCu6rs ) to get started learning about bug hunting.

  • @obaidebrahim
    @obaidebrahim 2 года назад +1

    IBM App scan is a good tools and give you best Repot

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      There are many different scanning tool options out on the market with each having pros and cons. The nice thing is that once you learn one tool, you can pretty easily learn another tool.

  • @RaymondJonesrejlive
    @RaymondJonesrejlive Год назад +1

    Good thing I was able to use my school email because gmail and yahoo emails arent allowed for sign up.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      Yeah I've seen a lot of companies cracking down on free service email addresses. Unfortunately that makes it difficult if you want to try a product or service for legitimate reasons.

  • @hdhhd7414
    @hdhhd7414 2 года назад +1

    good 1

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      I'm glad that you enjoyed the video!

  • @taohuang6535
    @taohuang6535 3 года назад +1

    What is the difference between vulnerability scanner and penetration tester?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +4

      Think of a scanner as just checking the surface to see if known vulnerability conditions exist even though they might not actually be exploitable versus a penetration test that will attempt to exploit the vulnerabilities. Scanners are also automated tools compared to penetration testing which might involve manual tests that could exploit business/application logic.

  • @yunusbahar6939
    @yunusbahar6939 2 года назад +1

    hi Jon, is it nessus can be used to check VA in Mobile application (React Native)

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      As long as Nessus has a plugin for what you're scanning ( www.tenable.com/plugins ), it will pick up vulnerabilities. Nessus IS NOT however a code scanning tool so it will not perform an analysis on your source code or perform dynamic testing without a plugin.

  • @DanielChiagozie
    @DanielChiagozie 4 месяца назад

    please what command prompt did you use while installing Nessus? is it the normal computer command prompt?

    • @JonGoodCyber
      @JonGoodCyber  4 месяца назад +2

      I recommend rewatching the video because every step of the process is detailed in this video including the operating system and commands that I used.

  • @johnvardy9559
    @johnvardy9559 11 месяцев назад +1

    Snort using on every day tasks or there are better Tools?

    • @JonGoodCyber
      @JonGoodCyber  11 месяцев назад +2

      What do you mean by every day tasks? I'm assuming this is for learning purposes...Snort is an IDS / IPS so you aren't necessarily going to get a ton of value from it unless you're attempting to do malicious activities or having attempted attacks that will trigger alerts.

  • @Kobifans
    @Kobifans Год назад +1

    Hi, for IPV6, is this reliable? Also, since this is a free version, do IPV6 scans on CPEs consume a large chunk on the free IPs?

    • @JonGoodCyber
      @JonGoodCyber  Год назад +2

      Many tools aren't really optimized for IPv6 so your experience may vary but Nessus does support IPv6 ( docs.tenable.com/nessus/Content/IPv6Support.htm ). There's no difference in consumption between an IPv6 address and an IPv4 address because it's still a single address.

    • @Kobifans
      @Kobifans Год назад

      @@JonGoodCyber appreciated Jon!

  • @johnatugba4789
    @johnatugba4789 3 года назад +3

    Nikto is another substitute to Nessus

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Nikto can definitely provide value when it comes to web application vulnerabilities.

  • @uche2564
    @uche2564 3 года назад +1

    Have you heard of splunk and burpsuite?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Yes, both tools are extremely popular in enterprises of all sizes.

  • @syeduroojkamal4986
    @syeduroojkamal4986 3 года назад +1

    real estate diss track gone wrong at 3:00 AM

  • @Egimatic
    @Egimatic 3 года назад +2

    What linux distro is that

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      Cent OS although installation across all Linux distributions is pretty similar.

  • @vq8gef32
    @vq8gef32 Год назад +2

    john any good open source Vulnerability Scanner ? Nessus is good but can't effort it. :)

    • @JonGoodCyber
      @JonGoodCyber  Год назад +2

      Are you talking about for home use? You can also get the home use license from Tenable for Nessus. Otherwise, OpenVAS ( www.openvas.org/ ) is pretty popular. You can also use nmap but keep in mind that its scanning functionality is fairly limited.

    • @vq8gef32
      @vq8gef32 Год назад +1

      @@JonGoodCyber Thank you John looking at it.

  • @Crazy--Clown
    @Crazy--Clown 3 года назад +1

    Dude you said smash the like button, well I did and I have a touch screen with a crack in it now. What will be the process for you to organise repair? It will be for a display replacement. My lawyer advised me to ask you first.

  • @hemanthk6960
    @hemanthk6960 Год назад +1

    Thanks a lot sir..

  • @deadx5581
    @deadx5581 2 года назад +1

    Can you please tell me how much false positive rate does nessus generate?

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      It's impossible to give an accuracy rate because there are so many factors that go into that including how the actual system being scanned is configured. With that being said, scanners still drastically improve your ability to find vulnerabilities, especially if you are doing credentialed scans.

    • @deadx5581
      @deadx5581 2 года назад +1

      @@JonGoodCyber appreciate your response. I am a newbie in terms of cyber sec. Aspects... Can u tell me how should one generate a detailed report of vulnerability assessment in nessus ?

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      The results that I show in this video will provide you detailed information or you can also use the "Report" or "Export" option depending on what you are trying to accomplish.

  • @fyodor8008
    @fyodor8008 2 года назад +1

    Does Nessus require an account to run? I'm helping a friend do a lab on it right now

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      You need to get an activation key from Tenable in order to run the software. In order to perform scans you can run them without login credentials or using credentialed scans. The main difference is that credentialed scans will be able to perform more accurate scans.

    • @fyodor8008
      @fyodor8008 2 года назад +1

      @@JonGoodCyber What do you mean by more accurate scans? Are you talking about how nmap only works with a couple options if you run it without sudo?
      Credentialed scans can access the raw data packets on the interfaces, right? Whereas non-credentialed ones will not allow packet crafting, OS identification, or stealth scans?
      Is that what you're saying?

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +3

      A non-credentialed scan is similar to what an attacker would see where it might not give the full story and a credentialed scan is like a privileged user logged into the system that can see a lot more. Check out the article to learn more about the differences: www.beyondtrust.com/resources/glossary/vulnerability-scanning#:~:text=Non-credentialed%20scans%2C%20as%20the,the%20systems%20they%20are%20scanning.&text=On%20the%20other%20hand%2C%20credentialed,eye%20view%20of%20the%20environment.

  • @rogierbakker5110
    @rogierbakker5110 7 месяцев назад +1

    Nessus expot import in TOPdesk?

    • @JonGoodCyber
      @JonGoodCyber  7 месяцев назад +2

      You'll have to look at the available export options and see if something fit your needs or if an integration exists. There's also ways to interact with the Nessus APIs but it all depends on your needs.

  • @jimgaba425
    @jimgaba425 6 месяцев назад +1

    How can I get a copy of Nessus Essentials - Not on their site anymore

    • @JonGoodCyber
      @JonGoodCyber  6 месяцев назад +1

      Unfortunately that happens eventually with any vendor and their products. I searched on Google and found it on their website: www.tenable.com/products/nessus/nessus-essentials

    • @jimgaba425
      @jimgaba425 6 месяцев назад +1

      Thank you - This was has the free version in the installer

  • @GAPSGraham
    @GAPSGraham 2 года назад +1

    One alternative is openVas

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      For learning, OpenVAS is definitely an alternative to play around with but in a commercial environment, I would never recommend it unless you had absolutely zero dollars for your budget.

  • @boardworker5138
    @boardworker5138 Год назад +1

    It appears there's no more Tenable "Essentials", just free trials of Pro and Expert. At least I can't find the download for Essentials.

    • @boardworker5138
      @boardworker5138 Год назад

      I take that back. They hid it really well. Search for the blog changing "home" to "essentials" and you'll get the link.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      You can try the downloads page ( www.tenable.com/downloads/nessus?loginAttempted=true ) along with an Activation Code request ( www.tenable.com/products/nessus/nessus-essentials?action=register ) but yeah they've made it way harder to get. I did see that you can do a trial with the Pro version too.

  • @DrGPaw007
    @DrGPaw007 3 года назад +1

    Is there a 64 bit Nessus install - i can only find 32bit for windows 10

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      I see a 64-bit version towards the bottom of the download list ( www.tenable.com/downloads/nessus?loginAttempted=true ).

    • @DrGPaw007
      @DrGPaw007 3 года назад +1

      @@JonGoodCyberthanks

  • @tony-thefiglovinstargazer
    @tony-thefiglovinstargazer Год назад +1

    👍

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      I'm glad that you enjoyed the content!

  • @nesgadol881
    @nesgadol881 3 года назад +1

    Does this tool detect hidden crypto mining code?

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Nessus will detect software that has known and reported vulnerabilities. These will typically have a CVE and can be found in databases such as the one from NIST ( nvd.nist.gov/ ). The purpose of Nessus isn't to detect or inventory software although it could bring to light software you didn't know you had or forgot about.

  • @poshsincebirth898
    @poshsincebirth898 2 года назад +2

    sheeeesh

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      I'm glad that you enjoyed the video!

  • @dylaneasley4943
    @dylaneasley4943 Год назад +1

    When I run it, it only says "Register Offline". Anyone know how to fix this?

    • @JonGoodCyber
      @JonGoodCyber  11 месяцев назад +1

      Did you ever figure out a solution?

  • @user-px7mu3wx4m
    @user-px7mu3wx4m 2 года назад +1

    nessus error activation failed. WHY?

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      I recommend checking out this article: community.tenable.com/s/article/Verify-Connection-to-the-Plugin-and-Activation-Server

  • @erhansaygin9390
    @erhansaygin9390 2 года назад +1

    Thanks man, but you did not talk about the reporting.

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      I'm glad that you enjoyed the video! The focus of this video was on the operational installation and usage of Nessus so reporting was outside of this video's scope. Typically if there are concerns with actual reports, companies will migrate to Tenable's Security Center (or a similar product) that offers much more robust reporting capabilities since standalone Nessus reports aren't amazing at scale. With that being said, if I receive enough interest then I will look at adding a follow up video.

  • @generalchannel5926
    @generalchannel5926 2 года назад +1

    Sir I am WORKING in soc how to run Nessus when I am in project coz that's not gonna be my personal system . So how to run it

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      This video details how to operate Nessus so I'm not exactly sure what you are asking.

  • @etynurlaila5711
    @etynurlaila5711 2 года назад +1

    How to get activation code?

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +2

      I cover that starting at 4:58 in the video.

  • @IAmCandal
    @IAmCandal 2 года назад +1

    expensive

    • @JonGoodCyber
      @JonGoodCyber  2 года назад +1

      What's expensive? The version for home use is free.

  • @irfanaffandys
    @irfanaffandys 3 года назад +2

    Your super secret password is 1234 isn't it? :p

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      You got me...now I'll have to change it again.

  • @thepast2007
    @thepast2007 3 года назад +1

    I have CURRENT Scan any browser Firefox Chromium I Get result Current 😡😡😡

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      Any issues with the tool itself should be directed to the developers so that they can fix them.

  • @manthing1467
    @manthing1467 3 года назад +1

    algo

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +1

      Thank you for the support and I'm glad you enjoyed the video!

  • @manfrombritain6816
    @manfrombritain6816 2 года назад +2

    wtf is PPD doing teaching Nessus instead of dota

  • @akshaykulkarni1301
    @akshaykulkarni1301 2 месяца назад +1

    user name is root and the password would be super secret. #root ;) ;P

  • @MrDabado
    @MrDabado 3 года назад +1

    4 minutes into the video and you still did not start with the tutorial,

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +2

      There are timestamps in the video if you simply want the tutorial steps, however the rest of the information is valuable for professionals in the industry.

  • @666og
    @666og 3 года назад +3

    this video could be a lot shorter, dislike

    • @JonGoodCyber
      @JonGoodCyber  3 года назад +11

      Thank you for the feedback. Unfortunately with any tutorial or procedural documentation, you have to assume that people are at ground zero which is why the video has some subjects that might be considered quite basic. I did include timestamps for those who want to go directly to certain parts of the video.

    • @simplyswallow9972
      @simplyswallow9972 3 года назад +3

      Did a good job Jon even if it is longer than this. People will always seek excuses unnecessarily. Do yours and let's watch. As advised, goto time stamps if you feel you don't need the preamble. Thanks

  • @DarkCode
    @DarkCode Год назад +1

    Do you have an updated video? this is outdated based on the website you provided.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +2

      Are you referring to the Tenable website that they seem to have recently updated? I'm assuming that's the case because they've made it impossible to find the free version. I will look through the video to see if there are any other changes but from what I see so far, that's been the only change. For right now, a simple google search for "Nessus Essentials" will still bring up the correct page ( www.tenable.com/products/nessus/nessus-essentials ). Thanks for letting me know!

    • @DarkCode
      @DarkCode Год назад +1

      @@JonGoodCyber I’ll check it out later today thanks for post. By the way do you know how I can do network scans legally? Any suggestions? I’m trying to learn this for Cybersecurity before I get entry level.

    • @JonGoodCyber
      @JonGoodCyber  Год назад +1

      The best strategy of systems to scan is to build a home lab (see my videos on this). Never scan systems that you don't own or have written permission (contract) from the owner.

  • @internetmemeplace6886
    @internetmemeplace6886 10 месяцев назад +1

    Wth is the root stuff

    • @JonGoodCyber
      @JonGoodCyber  10 месяцев назад +1

      Per Google, "Root is the superuser account in Unix and Linux. It is a user account for administrative purposes, and typically has the highest access rights on the system."

  • @ashishjadhav5169
    @ashishjadhav5169 11 месяцев назад +1

    Metaspolit with arimgaten (gui) it just automated everything

    • @JonGoodCyber
      @JonGoodCyber  11 месяцев назад +1

      Thanks for sharing! There are certainly ways to automate a lot of things but for example, it doesn't always make sense to allow a tool like Metasploit on a network, especially if you aren't conducting a penetration test. Also, I believe you mean Armitage.