O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

Let's begin our advanced scanning techniques using Nessus:

  1. To perform a more advanced scan with Nessus, we will explore several options available to us. Select Scans from the top. Select New Scan | Advanced Scan. From our General screen, add a descriptive name; and target your Metasploitable VM's IP address.
  2. Spend a minute to scroll through the Basic options on the left. We can perform scheduled scans. We can also provide notifications when the scan is done.
  3. Select Discovery | Host Discovery; look through the options available. You will note that we can turn on various discovery methods including scanning for network printers. 
Since we already know the specific host that we want to scan, we need not select any other options ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required