New Nessus Videos - Scanning With Credentials
Providing credentials to Nessus so that it can log into the systems being scanned is a very effective method of vulnerability scanning. It enables the scanner to provide a patch audit, perform local operating system identification, portscanning, and audit the configuration files present on the target. For web application testing, credentials allow Nessus to enumerate and detect vulnerabilities inside the application, ensuring that a larger percentage of functionality is tested. The following two videos cover how to perform both network-based credentialed scanning, and provide credentials for web application scanning using Nessus 4.2.
Network-based Credentialed Scanning & Patch Auditing
Nessus 4.2 - Web Application Scanning With Credentials
Additional Resources
- Asking for Credentials from IT
- Protecting Scanning Credentials from Malicious Insiders
- 3 Reasons You Should Be Using Credentialed Scanning (By Jason Holcomb, Digital Bond)
Learn more
- Nessus
Tenable One
Request a demo
The world’s leading AI-powered exposure management platform.
Thank You
Thank you for your interest in Tenable One.
A representative will be in touch soon.
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success