- now completely commercial, closed-source 
- check the other commercial and free packages too 
- updating plugins - 
	- do it manually 
- "evilgrade ISR" - 
	- beware of auto-updating software 
- DNS cache poisoning 
- java, qt, mac osx goes to evilgrade server 
- notepad++ 
 
- nessus-update-plugins 
- Problem: if you have changed public IP, it needs to be re-registered 
- report plugin version to customer, in report 
 
- all plugins enabled will crash most systems 
- use credentialled scan if possible 
- if cust's nessus automatically uses authentication over SMB - 
	- use smbrelay on metaqsploit 
- wait until nessus sends userid and passwordhash 
- metasploit pivots and authenticates back 
- this attack also works on regular users or admins 
 
- use "SMB use host SID to enum local users" 
- tip: output reports in every possible format to share with customer as needed 
  - nessus exercise slide 140 
  - afternoon break