Using a Nessus Scanner on a

Slides:



Advertisements
Similar presentations
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Advertisements

Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
Greg Williams. IT Security Program  Objective is to maintain integrity of University systems  Minimum Security Standard.
VistA Imaging Capture and Display. Presenter Marilyn Freeman, RHIA California Area Office VistA Imaging Coordinator| MU Coordinator HIM Consultant.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Greg Williams. IT Security Program  Objective is to maintain integrity of University systems  Minimum Security Standard 12/5/2010Greg Williams CS591.
Computer Parts There are many parts that work together to make a computer work.
Vulnerability Types And How to Use Them.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
The Basics  Operating systems (OS) can help computer users do many things, like managing and manipulating files and folders.  Operating systems also.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Explain the purpose of an operating system
Hardware Management in Windows XP. Device Manager  Overview of device manager list of devices and status (example)example driver details and upgrade.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Jonathan Loving Fermi Lab Computing Division
Mark Shtern.  Secure your infrastructure using IDS, application firewalls, or honeypots  Plant your flag on opponent’s machine  Prevent intruders from.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Game Mark Shtern. Game Objectives Secure your infrastructure using IDS, application firewalls, or honeypots Plant your flag on opponent’s machine Prevent.
1 COMPUTER LAB REGULATION
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
NESSUS. Nessus Vulnerability Scanner Features: Ease of use Deep Vulnerability Analysis Discover network based and local vulnerabilities Perform configuration.
Windows Vista Configuration MCTS : Network Security.
Al Lilianstrom CD/LSC/SOS/ESG  Blocked?  Operating Systems  Baselines  Detection  TiSSUE  Compliance  Windows  OS/X  Questions.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Presented by Martin Šimek Ransomware, Internet of Things and Botnets vs. Control.
Enterprise Vulnerability Management
CITA 352 Chapter 6 Enumeration.
Nessus Scan exercise Arkadiy Kantor MIS5211.
Calvin Wilson Craig Delzangle
Nessus Vulnerability Scan
Nessus Vulnerability Scan Report
Any Mobile Device. Any Printer. Any User. Presto!
Penetration Testing Karen Miller.
Technology Envioronment
Best HP Support For Replacing HP Envy Printer Cartridges Toll Free: Visit: http: // 123hp.org / Visit: http: // 123hp.org /
Brother Printer Support Helpline Number Ireland:
ASSIGNMENT NO.-2.
33 Port Scanners (w/out major risk factor)
السلام عليكم.
Malwarebytes Updating Automatically
Everything You Need To Know About Penetration Testing.
Malwarebytes Signature Issues
Nessus Vulnerability Scanning
Intro to Ethical Hacking
Intro to Ethical Hacking
Analysis Report Kali Linux Metasploit
بسم الله الرحمن الرحيم الموضوع:الوضوء صفته وفرائضه وسننه
Nessus Vulnerability Assessment
الانترنت والبريد الإلكتروني
Burp suite proxy evaluation: for Poly Scientific R& D Corp
Computer Security Fundamentals
Nessus Vulnerability Scan
Game Mark Shtern.
Metasploit Analysis Report Overview
Analyzing OS Sample Windows 7 image provided by different class
Game Mark Shtern.
Roberto Nogueda ITACS 5211: Introduction to Ethical Hacking
Alaris® Auto-ID & Hand-Held Scanners
Ашық сабақ 7 сынып Файлдар мен қапшықтар Сабақтың тақырыбы:
Windows басқару элементтері
Metasploit assignment – Arkadiy Kantor – Mis-5212
Қош келдіңіздер!.
NESSUS SCANNING By: Vaibhav Shukla.
Информатика пән мұғалімі : Аитова Карима.
Presentation transcript:

Using a Nessus Scanner on a MIS5211 Jon Whitehurst Assignment #2 Using a Nessus Scanner on a Home Network

Nessus Vulnerability Results Workstations Discovered: Apple I pad – 192.168.101 Windows Vista – 192.168.1.104 Web TV -192.168.1.105 Fedora 23 Linux Workstation 195.168.85.131

Nessus Vulnerability Results Workstations Scanned: Apple I pad – 192.168.101 Windows Vista – 192.168.1.104 Web TV -192.168.1.105 Fedora 23 Linux Workstation 195.168.85.131

Nessus Vulnerability Results Workstations interesting vulnerabilities : Windows Vista – 192.168.1.104

Nessus Vulnerability Results Workstations interesting vulnerabilities: Fedora 23 Linux Workstation 195.168.85.131

Nessus Vulnerability Next Steps Perform scans on a regular basis When concerned about devices that have low, medium or critical vulnerabilities, Patch them or turn them off when not in use. Remove any devices from the network that are considered not supported by the vendor.