Video Description

In this final video on Nessus we examine how to import a scan into the Metaploitable database. Various file formats are available and a nice feature of the framework is the ability to auto-detect the import file type. Once the scan data has been imported into the framework's database, you can then examine it carefully for vulnerabilities. The ability to save the gathered info such as service credentials allows you to later run various exploits without the need to re-scan. The industry standard for vulnerability, configuration and compliance assessments used by more than one million users across the globe. Nessus prevents network attacks by identifying the vulnerabilities and configuration issues that hackers use to penetrate your network. **Download Nessus from Tenable to follow along the with the course! Click below to download your free trial of Learn more about Tenable on their Cybrary channel. Click below to follow for all the latest updates: **

Course Modules

Metasploit