TOC & Recently Viewed

Recently Viewed Topics

Windows Content Command Line Examples

In this section, we will create a fake text document with a .tns extension and then run several simple to complex .audit files against it. As we go through each example, we will try each supported case of the Windows Content parameters.

We will also use the nasl command line binary. For each of the .audit files we are showing, you can easily drop these into your Nessus 6 or SecurityCenter scan policies, but for quick audits of one system, this way is very efficient. The command we will execute each time from the /opt/nessus/bin directory will be:

# ./nasl -t <IP> /opt/nessus/lib/nessus/plugins/compliance_check_windows_file_content.nbin

Where <IP> is the IP address of the system you will be auditing.

With Nessus, when running the .nbin (or any other plugin), it will prompt you for the credentials of the target system, plus the location of the .audit file.

This section includes the following information:

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.