A big thank you.
A big thank you.
Thanks for a nice tutorial.
Thanks for the great tutorial, but is nessus still viable to use as a vulnerability scanner? I've heard they closed the source code and many people are now using OpenVAS as supplied with recent versions of Backtrack.
I am also having an issue with loading the web interface on the loopback address. The server is running, I installed Flash (does it even use flash?), scripting is enabled, and there is nothing wrong with the loopback interface that I can see. Everything with the install went without a hitch.
I checked the conf file and verified the port that it listens on and made sure all the parameters were correct. But, for whatever reason, I am unable to connect to the web interface for Nessus using: https://127.0.0.1:8834
Anyone have any ideas?
Well. This explains allot. ;) I have tried 2 hours or more. Right now im installing backtrack 4 fresh to VMware. And trying it out again. Thanks for this post! No client, thats news for me..
GOOD paper!Thank you very much!
You can also search like this 192.168.1.1-255 I don't know whether this is useful info. Thanks.
Yeea i like you tutorial.
i ave on question. i have set up nessus and its up and running.
i have took a complete scan on my lan network with five computer.
so after 5 hours i have no conclusion.
its normaly that take a scan a very long time to determine the most informations?
A follow up to my post above, I was able to connect to the web interface for nessus. For some reason it didn't bind to my loopback interface. So using https://127.0.0.1:8834 to connect to wasn't working. But I plugged my eth0 interface into my switch and connected via that interface's IP and it worked fine. Not sure why it isn't bound to the loopback interface as well though. I didn't see anything in the nessusd.conf file that specified an interface to listen on.
Hopefully that will help anyone else having issues connecting to Nessus via loopback address.