Comprehensive Analysis of Nessus and Nmap for Network Security

Verified

Added on  2024/05/29

|17
|1294
|337
Report
AI Summary
This report provides a detailed analysis of two prominent network security tools, Nessus and Nmap. Nessus, a proprietary vulnerability scanner, is explored in terms of its features, working mechanism, and application in identifying misconfigurations, common passwords, and potential denial-of-service vulnerabilities. Nmap, a free security scanner used for host and service discovery, is examined for its host discovery, port scanning, OS detection, and version detection capabilities. The report contrasts the security features, detection times, and ease of use of both tools. A case scenario involving an educational institute (UVW) highlights the selection of Nessus based on its ability to provide multiple services, efficient attack management through plugins, and periodic auditing. The conclusion emphasizes the essential role of vulnerability scanners in network security and the ongoing competition between Nessus and Nmap in providing robust security solutions. Finally, the report mentions that these tools help to protect weak components from known attacks.
Document Page
ANALYSIS OF NETWORK SECURITY TOOLS
Network security referred as policies and practices adopt to avoid and
supervise unauthorized access, misuse, modification, or rejection of a
computer network and network-accessible possessions.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Nessus
Nessus is proprietary, vulnerability scanner.
It is free of cost for personal employ.
Vulnerability scanner is a scanner which is use
to discover weak points and poorly constructed
path.
Nessus allows scans for following vulnerability:
Misconfiguration
Common passwords, default passwords
and blank spaces.
Denial of service
Preparation of Data Security Standards
audits.
Document Page
FEATURES OF NESSUS
Following are the features of Nessus:
Up-to-date security database: database security is high and updated.
Scalable: Nessus is scalable that means can exploit the strength of the
system, so the scanning of this software is efficient.
Multiple services: Multiple services can be run by a host.
Remote and local security: Remote and local security is provided by the
Nessus.
Plug-ins: For every security test, there is a plug-ins which is written in
NASL.
NASL: NASL stands for Nessus Attack Scripting Language, it’s language
designed for the security test.
Non-destructive audits: Nessus allows to perform the non- destructive
security audit on the daily basis or periodically.
Document Page
WORKING OF NESSUS
1. Configure and use nessus: This
first step we will configure the
nessus which follow the
installation wizard. We wills
create the administration user
account and activate the account
with the activation code.
2. This is the basic operation of the
nessus such as we will provide the
name and visibility. Description is
also given if necessary.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WORKING OF NESSUS
(contd…)
3. This will show the scan audits of the
application. The advantage of scan
audit is that all the data it achieved at
the one time.
4. In the 4th image, all the scans are
displayed on the screen. Then the test
is applied to the scans for the efficient
result.
Document Page
WORKING OF NESSUS
(contd…)
5. Running process will be displayed
like this on the screen. Vulnerabilities
can be viewed.
6. At the last the status report is
displayed, which tells us about the
final attacks and vulnerabilities in the
network.
Document Page
NMAP
Nmap is a free security scanner.
Used to determine hosts & services on computer
network.
We can see Nmap as building a ‘map’ on the
compute network.
To analyze the response, crafted packets are send
to the hosts.
Nmap is started for the Linux only, but now it is
ported to windows, Solaris and many other
platforms.
Nmap can adjust to various network conditions
with latency & congestion during a scan.
It continues to extend and improve the tool
periodically.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
FEATURES OF NMAP
Following are the features of nmap:
Host discovery: host is discovered in
the host discovery features.
Port Scanning: Identifying the open
ports on target has.
OS detection: OS detection determine
the operation system in addition with
hardware characteristics of the
computing and network device.
Version detection: It is used to discover
the name of the application and the
number of the version.
Document Page
WORKING
1. Enter the target to 127.0.0.1 or
any other port and profile to
intense scan, then click to scan.
The result will be Nmap output.
Like displayed in the picture.
2. post/host will be displayed. This will
show the port as well as services.
Document Page
WORKING
(contd..)
3. Topology shows the route for the
scan .
4. Host details shows a outline of the
target through scans, such as the port
number, IP address, host name, OS,
and many more.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
WORKING (contd..)
5. Scan tab keep the commands of
lastly run scans. This allows quickly re-
scan with a definite set of parameters.
Document Page
NESSUS AND NMAP DIVERGENCE
Nessus
Security features-
-> It uses plug-ins to provide
the security and its
management.
-> Real attacks are
performed and report is
given for these attacks.
-> Prevent intrusion and
DOS(denial of service).
Nmap
Security features-
-> Unauthorized connected
device can be detected.
-> Detect the device with
open port which is not
open.
-> Detect the unauthorized
user which is accessing the
services
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]