top of page

Nessus 10.3 Packaged by IOanyT Innovations- Ubuntu Server


Nessus is a remote security scanning tool, that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. Nessus employs the Nessus Attack Scripting Language (NASL), a simple language that describes individual threats and potential attacks.


To verify the installation, follow the below instructions

Step 1. Connect to SSH:

  1. Open the Amazon EC2 console at

  2. In the navigation pane, choose Instances.

  3. Select the instance and choose Connect.

  4. Choose SSH Client

  5. Copy the SSH command and paste it into the terminal.

ssh ubuntu@publicIP -i [Path of key pair file]

If it shows an access denied message run the following command, then run the above command again to connect via ssh.

chmod 400 [Path of key pair file]

Once launched in the Amazon EC2 Service, please connect to the instance via an SSH client using the ec2-user with the key pair associated at launch. Once connected as the ec2-user user, you will be able to sudo to the root user by issuing the below command.

To monitor and assess application functions:-

Data Store Region Name Location: US East (N. Virginia)

  1. Navigate to your Amazon EC2 console and verify that you're in the correct region.

  2. Choose Instances and select your launched instance.

  3. Select the server to display your metadata page and choose the Status checks tab at the bottom of the page to review if your status checks passed or failed.

Access and Security

Please update the security group of the target instance to allow the below ports and protocols for access and connectivity.

To add a rule to a security group for inbound SSH traffic over IPv4:
  1. Open the Amazon EC2 console at

  2. From the top navigation bar, select a Region for the security group. Security groups are specific to a Region, so you should select the same Region in which you created your instance.

  3. In the navigation pane, choose Instances.

  4. Select your instance and, in the bottom half of the screen, choose the Security tab. Security groups list the security groups that are associated with the instance. Inbound rules display a list of the inbound rules that are in effect for the instance.

  5. For the security group to which you'll add the new rule, choose the security group ID link to open the security group.

  6. On the Inbound Rules tab, choose Edit inbound rules.

  7. On the Edit inbound rules page, do the following:

    1. Choose Add rule.

    2. For Type, choose SSH, HTTP, Custom TCP

    3. In Custom TCP add in the Port range - 8834 ( For application Dashboard)

    4. For Source, choose Custom and then choose in the CIDR block

    5. Choose Save rules.

Step 2. Verify the installation

Follow the steps to verify the installation and Login

  1. Open the Amazon EC2 console at

  2. In the navigation pane, choose Instances and select your instance.

  3. The following information is available on the Networking tab: Public IPv4 address

  4. Copy its public IP.

  5. Paste the public IP into a new browser tab (do not hit enter yet)

  6. Append:8834 to the end of the public IP. https://<Public id>:8834

  7. Hit Enter then the Nessus Welcome dashboard will open.

  8. Select Nesses Essentials and click on Continue

7. Fill up all these details and then click on Email Button.

8. After clicking on the Email button then kindly check your email to get your activation code.

9. Copy that activation code and paste it into your activation code.

9. Then create your credentials username and password and then click on Submit button.

10. After clicking on submit button then wait for a minute to complete downloading plugins.

11 After completing the downloading plugins the Nessus dashboard will open.

  • For details on how to use this application please visit:

  • For detailed information about managing and requesting increased service please visit:



Let’s Work Together

IOanyT Innovations Pvt. Ltd.


  • LinkedIn
  • Facebook

Thanks for submitting!

bottom of page