Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Nessus Scan

Posted on 2016-07-14
1
Medium Priority
?
83 Views
Last Modified: 2016-08-02
How can I do a Nessus scan using the xml server configuration files as part of the scan?
0
Comment
Question by:Eric Donaldson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 41712835
I am thinking along the line of the below based on  XCCDF content downloaded from NIST's web site to perform a USGCB audit @ https://discussions.tenable.com/thread/6342

The nessus has CLI but so far still txt based for targetlist, the past approach is based on the "--config-file" option (closest) that specify the client-side Nessus configuration file (.nessusrc) to use. This option is only used when starting the "nessus" client and not XML though.
https://hackertarget.com/nessus-scanning-command-line/
http://www.edgeos.com/nessuskb/results.cgi?show_all_cli=1

Doesn't seems to have a direct means to do it
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question