Jumat, 27 Januari 2012

How to use nessus and exploit DB on backtrak 5 R1

Open nessus and star 
open localhost:8834 in browser
     it will exit the display as below



pleace wait the process is complete, when finished it will exit the display as below


then input user name and password 


 
select the scan and then add


input the name is up to you
on the policy select the category that will be scanned
the target input scan targets to be scanned
select lounch scan

when the scan is complete look at the picture below


doubel click on one of which is complete scanan, it will exit the following result


 above is the result of the scan


 above is a scan of dmna kalemahan total, high, medium, low, and ports open


 
 results from the largest total protocol

 above is the plugin name from the windows system is scanned

 open the application exploitDB search,
 
 above is the command to know the type of data and type the command ftp

above is the command to know the type of data and type the command samba

 running exploits

 
 The above are the order in which the nano nano is to menedit ip address and there is also this platform is the cp command to copy files that exploit
 

 
 and above there are two orders of nano and perl where perl is to run the exploit Namu exploits that I did not find its location





Tidak ada komentar:

Posting Komentar