Date: Mon, 25 Sep 2000 14:38:07 -0400 From: Andrew J Caines <A.J.Caines@altavista.net> To: "'freebsd-security@freebsd.org'" <freebsd-security@FreeBSD.ORG> Cc: Nessus list <nessus@lists.nessus.org> Subject: Re: Penetration testing question.... Message-ID: <20000925143807.A401@hal9000.bsdonline.org> In-Reply-To: <00BF97DD9F3FD311AB860060084E50DD311C71@exchange.xpert.com>; from Yonatan@xpert.com on Mon, Sep 25, 2000 at 10:05:16AM %2B0300 References: <00BF97DD9F3FD311AB860060084E50DD311C71@exchange.xpert.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Yonatan Bokovza suggested... > /usr/ports/security/nessus* is a good general-purpose security scanner. I'll second that. Nessus is a great network vulnerability testing suite. It's well designed, produces good reports and, most importantly, the modular vulnerability tests are kept well up-to-date. See http://www.nessus.org/ for details. nb. www.nessus.com is the developers' new commercial organisation for providing paid support. They alway have been and still are very responsive to questions and issues on the mailing lists. While the ports can help you get started, you'll want to keep up with the vulnerability tests, aka. "Nessus Plugins". There is more than one way to do this, but getting Nessus by CVS is my preferred method. See the web site for details. I have a simple script to automate the process. Let me know if you're interested. -Andrew- -- _______________________________________________________________________ | -Andrew J. Caines- Unix Systems Engineer A.J.Caines@altavista.net | To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000925143807.A401>