Windows Content Command Line Examples
In this section, we will create a fake text document with a
.tns extension and then run several simple to complex
.audit files against it. As we go through each example, we will try each supported case of the Windows Content parameters.
We will also use the
nasl command line binary. For each of the
.audit files we are showing, you can easily drop these into your Nessus 6 or SecurityCenter scan policies, but for quick audits of one system, this way is very efficient. The command we will execute each time from the
/opt/nessus/bin directory will be:
# ./nasl -t <IP> /opt/nessus/lib/nessus/plugins/compliance_check_windows_file_content.nbin
Where <IP> is the IP address of the system you will be auditing.
With Nessus, when running the
.nbin (or any other plugin), it will prompt you for the credentials of the target system, plus the location of the
This section includes the following information: