tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 17

Open Source Security Tools : Practical Guide to Security Applications part 17. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 139 Thursday June 24 2004 11 11 AM Vulnerability Scanners to the Rescue 139 Nessus Plugins Tab Once you are logged in you can access the other tab sections. The Plugins tab is where you can selectively enable or disable certain groups of plug-ins as well as individual plugins see Figure . Each category is listed and when you click on a category the individual plug-ins in that category appear in the lower section. By deselecting the box to the right of an item you can disable that category or plug-in. Plug-ins that may cause a problem with a service or can crash servers are highlighted with a triangular exclamation symbol see Figure . Nessus also has buttons that make it easy to quickly enable all plug-ins enable all but dangerous plug-ins disable all plugins or load a custom plug-in. You can use the Filter button to sort the plug-ins by Name Description Summary Author ID number or Category. I recommend that you generally run Nessus with dangerous plug-ins disabled unless you have prepared for a true denial of service test and are willing to risk crashing some of your servers. Nessus Preferences Tab Most of the server-side Nessus options are configured on the Preferences tab see Figure . The following sections and subsections cover these options. Figure Nessus Plugins Tab Page 140 Thursday June 24 2004 11 11 AM Chapter 5 Vulnerability Scanners 140 Nmap You use these Nmap settings to customize the configuration of how the port scan part of the test runs. Many of these correlate directly to the Nmap settings discussed in Chapter 4 so refer there for details on what each option means. TCP scanning technique Set the kind of port scan you want for example SYN FIN or Connect. Timing policy See the Nmap Timing Options section in Chapter 4. You can also enter a location for an Nmap results file so that Nessus will use that data rather than run a new scan. Ping the remote host This selection lets you ping the machines on .

TỪ KHÓA LIÊN QUAN