{"id":153,"date":"2023-05-18T16:18:11","date_gmt":"2023-05-18T15:18:11","guid":{"rendered":"https:\/\/learncyber.tech\/?p=153"},"modified":"2023-05-26T16:48:53","modified_gmt":"2023-05-26T15:48:53","slug":"how-to-conduct-vulnerability-scanning-using-nessus","status":"publish","type":"post","link":"https:\/\/learncyber.tech\/?p=153","title":{"rendered":"Vulnerability Scanning with Nessus"},"content":{"rendered":"\n<p>In this article, we will be performing a vulnerability scan using Nessus, the leading vulnerability scanner.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Before we start, let&#8217;s define a few important terms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is a Vulnerability?<\/h3>\n\n\n\n<p>A <em>vulnerability<\/em> is a weakness in the security of a system that can be exploited by a malicious entity to gain unauthorized access to, alter, or disrupt the availability of information or information systems.&nbsp;It is a security hole that provides a potential angle to attack the system.  It can come from many sources and may occur during design, implementation, configuration, or operation of an asset or control. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is Vulnerability Management?<\/h3>\n\n\n\n<p><em>Vulnerability management<\/em> is the ongoing process of identifying, classifying, prioritizing, reporting and remediating&nbsp;vulnerabilities&nbsp;across an organization&#8217;s infrastructure system. It is an essential component of information security and is often automated to keep computer systems, networks, and enterprise applications safe from cyberattacks and data breaches. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is Vulnerability Scanning?<\/h3>\n\n\n\n<p><em>Vulnerability scanning<\/em> is the process of scanning and identifying vulnerabilities, misconfigurations, or flaws in operating systems or software. It can be performed either manually or automatically by using an automated vulnerability scanning tool such as Nessus.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Getting Started<\/h2>\n\n\n\n<p>We will be using Metasploitable 2 as our target machine for the vulnerability scan. <em>Metasploitable 2<\/em> is an intentionally vulnerable Linux virtual machine created by the Rapid7 Metasploit team. It is used to conduct security training, test security tools, demonstrate common vulnerabilities, and practice penetration testing techniques.&nbsp;<\/p>\n\n\n\n<p>To start, download Metasploitable 2 by going to this link: <a href=\"https:\/\/sourceforge.net\/projects\/metasploitable\/\">Metasploitable download | SourceForge.net<\/a><\/p>\n\n\n\n<p>It is also available at <a href=\"https:\/\/information.rapid7.com\/download-metasploitable-2017.html\">Download Metasploitable &#8211; Intentionally Vulnerable Machine | Rapid7<\/a><\/p>\n\n\n\n<p><strong>Note: <\/strong>When using the second link, you must fill out a form before you can download Metasploitable.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1627\" height=\"1016\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sourceforge-edited.png\" alt=\"\" class=\"wp-image-217\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sourceforge-edited.png 1627w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sourceforge-edited-300x187.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sourceforge-edited-1024x639.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sourceforge-edited-768x480.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sourceforge-edited-1536x959.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sourceforge-edited-820x512.png 820w\" sizes=\"(max-width: 1627px) 100vw, 1627px\" \/><\/figure>\n\n\n\n<p>The download will come in a zipped folder. You can extract the contents of the folder by <strong>right-clicking<\/strong> it &gt; selecting <strong>Extract All<\/strong> &gt; choosing the <strong>Destination<\/strong> of the extracted files &gt; and clicking <strong>Extract<\/strong>.<\/p>\n\n\n\n<p>Now, open up VirtualBox. In the home screen, click <strong>New <\/strong>to create a new virtual machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"598\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/vbox-new-1024x598.png\" alt=\"\" class=\"wp-image-220\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/vbox-new-1024x598.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/vbox-new-300x175.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/vbox-new-768x448.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/vbox-new-820x479.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/vbox-new.png 1326w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the dialog box, fill out the required information:<\/p>\n\n\n\n<ol>\n<li>For the <em>Name<\/em>, you can enter Metasploitable 2.<\/li>\n\n\n\n<li>The information in the <em>Folder<\/em> field may vary, you can just leave it with the default option.<\/li>\n\n\n\n<li>Leave the <em>ISO Image<\/em> field blank.<\/li>\n\n\n\n<li>For <em>Type<\/em>, select <strong>Linux<\/strong>.<\/li>\n\n\n\n<li>For the <em>Version<\/em> field, choose <strong>Other Linux (64-bit)<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Click <strong>Next<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"605\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-virtual-machine-info-1024x605.png\" alt=\"\" class=\"wp-image-225\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-virtual-machine-info-1024x605.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-virtual-machine-info-300x177.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-virtual-machine-info-768x454.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-virtual-machine-info-820x484.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-virtual-machine-info.png 1398w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>To configure the <em>Hardware<\/em>, you can select 1 GB for the <em>Base Memory<\/em> also called RAM. <\/p>\n\n\n\n<p>For the <em>Processors<\/em>, 2 CPUs will work fine. Click <strong>Next<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"571\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Hardware-1-1024x571.png\" alt=\"\" class=\"wp-image-228\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Hardware-1-1024x571.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Hardware-1-300x167.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Hardware-1-768x428.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Hardware-1-820x457.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Hardware-1.png 1396w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Click <strong>Use an Existing Virtual Hard Disk File<\/strong>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"571\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Virtual-Hard-Disk-1-1024x571.png\" alt=\"\" class=\"wp-image-229\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Virtual-Hard-Disk-1-1024x571.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Virtual-Hard-Disk-1-300x167.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Virtual-Hard-Disk-1-768x428.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Virtual-Hard-Disk-1-820x457.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Virtual-Hard-Disk-1.png 1393w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Then choose a Virtual Hard Disk File by clicking the <strong>Add<\/strong> icon. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"218\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Add-1024x218.png\" alt=\"\" class=\"wp-image-230\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Add-1024x218.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Add-300x64.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Add-768x164.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Add-820x175.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Add.png 1111w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Look for the file in your downloads folder and click <strong>Open<\/strong>, then click <strong>Choose<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"877\" height=\"681\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/choose.png\" alt=\"\" class=\"wp-image-231\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/choose.png 877w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/choose-300x233.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/choose-768x596.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/choose-820x637.png 820w\" sizes=\"(max-width: 877px) 100vw, 877px\" \/><\/figure>\n\n\n\n<p>After clicking <strong>Next<\/strong>, you can see the summary for the virtual machine&#8217;s configuration. Click <strong>Finish<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"570\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Summary-1-1024x570.png\" alt=\"\" class=\"wp-image-232\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Summary-1-1024x570.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Summary-1-300x167.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Summary-1-768x427.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Summary-1-820x456.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Summary-1.png 1393w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Now start Metasploitable 2.<\/p>\n\n\n\n<p>Uh oh, seems like we ran into a problem. Don&#8217;t panic, we will resolve this together.<\/p>\n\n\n\n<p>First, power off the virtual machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"711\" height=\"400\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/noapic-edited.png\" alt=\"\" class=\"wp-image-250\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/noapic-edited.png 711w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/noapic-edited-300x169.png 300w\" sizes=\"(max-width: 711px) 100vw, 711px\" \/><\/figure>\n\n\n\n<p>Start Metasploitable again.<\/p>\n\n\n\n<p>When you see the following screen, press <strong>Escape<\/strong> on your keyboard.<\/p>\n\n\n\n<p><strong>Note: <\/strong>You only have a few seconds to perform this action, if you failed to do so, you have to restart again.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Grub-edited-1.png\" alt=\"\" class=\"wp-image-252\" width=\"721\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Grub-edited-1.png 541w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Grub-edited-1-300x200.png 300w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><\/figure>\n\n\n\n<p>Press &#8216;<strong>e<\/strong>&#8216; on your keyboard to edit.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"720\" height=\"403\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ubuntu.png\" alt=\"\" class=\"wp-image-244\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ubuntu.png 720w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ubuntu-300x168.png 300w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/figure>\n\n\n\n<p>Press &#8216;<strong>e<\/strong>&#8216; again.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"714\" height=\"405\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/root.png\" alt=\"\" class=\"wp-image-236\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/root.png 714w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/root-300x170.png 300w\" sizes=\"(max-width: 714px) 100vw, 714px\" \/><\/figure>\n\n\n\n<p>Type &#8216;<strong>noapic<\/strong>&#8216; and press <strong>Enter<\/strong>.<\/p>\n\n\n\n<p><strong>Note: <\/strong>Keep in mind the space before the word &#8216;noapic&#8217;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"718\" height=\"399\" src=\"http:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/edit-noapic.png\" alt=\"\" class=\"wp-image-239\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/edit-noapic.png 718w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/edit-noapic-300x167.png 300w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/figure>\n\n\n\n<p>Press the <strong>down arrow key<\/strong> and press &#8216;<strong>e<\/strong>&#8216; to edit.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"720\" height=\"403\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kernel.png\" alt=\"\" class=\"wp-image-245\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kernel.png 720w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kernel-300x168.png 300w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/figure>\n\n\n\n<p>Type &#8216;<strong>noapic<\/strong>&#8216; just like in the previous instruction.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"717\" height=\"394\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/latest-noapic.png\" alt=\"\" class=\"wp-image-256\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/latest-noapic.png 717w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/latest-noapic-300x165.png 300w\" sizes=\"(max-width: 717px) 100vw, 717px\" \/><\/figure>\n\n\n\n<p>Now press &#8216;<strong>b<\/strong>&#8216; on your keyboard to boot Metasploitable 2.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"723\" height=\"397\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/boot.png\" alt=\"\" class=\"wp-image-243\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/boot.png 723w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/boot-300x165.png 300w\" sizes=\"(max-width: 723px) 100vw, 723px\" \/><\/figure>\n\n\n\n<p>Congratulations! You have fixed the issue.<\/p>\n\n\n\n<p>Now we can log into Metasploitable 2 using the default credentials:<\/p>\n\n\n\n<p><strong>username:<\/strong> <em>msfadmin<\/em> ; <strong>password:<\/strong> <em>msfadmin<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"720\" height=\"405\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/metasploitable-login.png\" alt=\"\" class=\"wp-image-240\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/metasploitable-login.png 720w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/metasploitable-login-300x169.png 300w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/figure>\n\n\n\n<p><strong>Note: <\/strong>The operating system does not have a GUI by default.&nbsp;Instead, it is designed to be used via command line interface (CLI).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Installing and Configuring Nessus<\/h2>\n\n\n\n<p>Nessus is a proprietary vulnerability scanner developed by Tenable Inc. It is used by security professionals to scan systems for vulnerabilities and provide recommendations on how to fix them. <\/p>\n\n\n\n<p>We will be installing Nessus into our Kali Linux virtual machine. If you don&#8217;t have a Kali VM installed, you can refer to this guide on <a href=\"https:\/\/learncyber.tech\/?p=58\">How to Install Kali Linux<\/a>.<\/p>\n\n\n\n<p>First, start up your Kali VM, open a web browser and go to this link to download Nessus Essentials: <a href=\"https:\/\/www.tenable.com\/products\/nessus\/nessus-essentials\">Tenable Nessus Essentials Vulnerability Scanner<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"675\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Nessus-download-site-1024x675.png\" alt=\"\" class=\"wp-image-155\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Nessus-download-site-1024x675.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Nessus-download-site-300x198.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Nessus-download-site-768x506.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Nessus-download-site-1536x1013.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Nessus-download-site-820x541.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Nessus-download-site.png 1993w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>You will have to fill out the form to obtain an activation code. After registering your information, click the <strong>Download <\/strong>button to go to the site where you can download Nessus Essentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"522\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/After-registering-1024x522.png\" alt=\"\" class=\"wp-image-156\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/After-registering-1024x522.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/After-registering-300x153.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/After-registering-768x392.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/After-registering-1536x783.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/After-registering-2048x1044.png 2048w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/After-registering-820x418.png 820w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Choose the appropriate download version and platform, here I selected <strong>Linux-Debian-amd64<\/strong> since I&#8217;m using Kali Linux OS. Then click <strong>Download<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"597\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Download-and-Install-Nessus-1024x597.png\" alt=\"\" class=\"wp-image-157\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Download-and-Install-Nessus-1024x597.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Download-and-Install-Nessus-300x175.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Download-and-Install-Nessus-768x448.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Download-and-Install-Nessus-1536x896.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Download-and-Install-Nessus-2048x1195.png 2048w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Download-and-Install-Nessus-820x478.png 820w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>A dialog box will pop up, click <strong>I Agree <\/strong>to agree to the License Agreement.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"885\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/License-Agreement-1024x885.png\" alt=\"\" class=\"wp-image-158\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/License-Agreement-1024x885.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/License-Agreement-300x259.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/License-Agreement-768x664.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/License-Agreement-820x709.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/License-Agreement.png 1197w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Open the Terminal application and go to your <em>Downloads <\/em>directory to verify if the download was successful.<\/p>\n\n\n\n<p>Here, we can see it was successfully downloaded.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ls-downloads-1.png\" alt=\"\" class=\"wp-image-178\" width=\"839\" height=\"104\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ls-downloads-1.png 663w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ls-downloads-1-300x37.png 300w\" sizes=\"(max-width: 839px) 100vw, 839px\" \/><\/figure>\n\n\n\n<p>Install the Nessus package by typing the command <em>sudo dpkg -i Nessus-10.5.2-debian10_amd64.deb<\/em><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@kali:~<\/strong>$ sudo dpkg -i Nessus-10.5.2-debian10_amd64.deb<\/code><\/pre>\n\n\n\n<p>The <em>dpkg<\/em>&nbsp;command is used to install, remove, and manage Debian packages and using the&nbsp;<em>-i<\/em>&nbsp;option specifies that the package is to be installed.&nbsp;We used&nbsp;<em>sudo<\/em> to execute the command with administrative privileges.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1471\" height=\"980\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Sudo-dpkg-nessus-command-2-edited.png\" alt=\"\" class=\"wp-image-182\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Sudo-dpkg-nessus-command-2-edited.png 1471w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Sudo-dpkg-nessus-command-2-edited-300x200.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Sudo-dpkg-nessus-command-2-edited-1024x682.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Sudo-dpkg-nessus-command-2-edited-768x512.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Sudo-dpkg-nessus-command-2-edited-820x546.png 820w\" sizes=\"(max-width: 1471px) 100vw, 1471px\" \/><\/figure>\n\n\n\n<p>Now, you can start and check the status of the Nessus service by entering the following commands:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@kali:~<\/strong>$ sudo systemctl start nessusd.service<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@kali:~<\/strong>$ sudo systemctl status nessusd.service<\/code><\/pre>\n\n\n\n<p>The <em>systemctl <\/em>command is used to control the systemd system and service manager while the&nbsp;<em>start<\/em>&nbsp;option is used to start the specified service.<\/p>\n\n\n\n<p>The command <em>sudo systemctl status nessusd.service<\/em> is used to check the status of the Nessus service on your Linux machine. The output will show you whether the service is running or not, and if it\u2019s not running, it will give you an error message that can help you troubleshoot the issue. You can also use this command to check the status of other services installed on your machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1005\" height=\"669\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Start-and-status-nessusdservice-edited.png\" alt=\"\" class=\"wp-image-186\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Start-and-status-nessusdservice-edited.png 1005w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Start-and-status-nessusdservice-edited-300x200.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Start-and-status-nessusdservice-edited-768x511.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Start-and-status-nessusdservice-edited-820x546.png 820w\" sizes=\"(max-width: 1005px) 100vw, 1005px\" \/><\/figure>\n\n\n\n<p>To access the Nessus web interface, open&nbsp;the browser and use either of the following URLs: <strong>https:\/\/127.0.0.1:8834<\/strong> or <strong>https:\/\/localhost:8834<\/strong><\/p>\n\n\n\n<p><strong>Note:<\/strong> The web interface uses port 8834 as you may have read from the output when we installed the Nessus package.<\/p>\n\n\n\n<p>A warning message will appear similar to the one shown in the image below, you can click <strong>Advanced<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1436\" height=\"957\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/localhost-edited-2.png\" alt=\"\" class=\"wp-image-190\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/localhost-edited-2.png 1436w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/localhost-edited-2-300x200.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/localhost-edited-2-1024x682.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/localhost-edited-2-768x512.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/localhost-edited-2-820x546.png 820w\" sizes=\"(max-width: 1436px) 100vw, 1436px\" \/><\/figure>\n\n\n\n<p>Click <strong>Accept the Risk and Continue<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"981\" height=\"396\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Accept-the-risk.png\" alt=\"\" class=\"wp-image-164\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Accept-the-risk.png 981w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Accept-the-risk-300x121.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Accept-the-risk-768x310.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Accept-the-risk-820x331.png 820w\" sizes=\"(max-width: 981px) 100vw, 981px\" \/><\/figure>\n\n\n\n<p>Click <strong>Continue<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-to-nessus-edited-3.png\" alt=\"\" class=\"wp-image-208\" width=\"465\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-to-nessus-edited-3.png 677w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-to-nessus-edited-3-300x225.png 300w\" sizes=\"(max-width: 677px) 100vw, 677px\" \/><\/figure>\n\n\n\n<p>Select <strong>Register for Nessus Essentials <\/strong>and click <strong>Continue<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Register-for-ne-esse-edited-2.png\" alt=\"\" class=\"wp-image-198\" width=\"839\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Register-for-ne-esse-edited-2.png 749w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Register-for-ne-esse-edited-2-300x225.png 300w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><\/figure>\n\n\n\n<p>Since we have already registered, we can <strong>Skip <\/strong>this part.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"509\" height=\"678\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/skip-edited-1.png\" alt=\"\" class=\"wp-image-196\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/skip-edited-1.png 509w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/skip-edited-1-225x300.png 225w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/><\/figure>\n\n\n\n<p>Here, you can paste the Activation Code that was sent to your email when you registered. Click <strong>Continue<\/strong>.<\/p>\n\n\n\n<p><strong>Note: <\/strong>This is a one-time code, if you uninstall and then reinstall Nessus, you will need to register again and receive another activation code.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"507\" height=\"761\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/activation-code-edited-2.png\" alt=\"\" class=\"wp-image-201\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/activation-code-edited-2.png 507w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/activation-code-edited-2-200x300.png 200w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/figure>\n\n\n\n<p>To confirm, click <strong>Continue<\/strong>. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"504\" height=\"378\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/click-continue-edited-1.png\" alt=\"\" class=\"wp-image-207\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/click-continue-edited-1.png 504w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/click-continue-edited-1-300x225.png 300w\" sizes=\"(max-width: 504px) 100vw, 504px\" \/><\/figure>\n\n\n\n<p>Now, create a user account, then click <strong>Submit<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"531\" height=\"796\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-a-user-account-edited-1.png\" alt=\"\" class=\"wp-image-204\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-a-user-account-edited-1.png 531w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-a-user-account-edited-1-200x300.png 200w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/figure>\n\n\n\n<p>It will begin downloading the plugins, this process may take a while so be patient.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"638\" height=\"479\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Initializing-edited-1.png\" alt=\"\" class=\"wp-image-206\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Initializing-edited-1.png 638w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Initializing-edited-1-300x225.png 300w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><\/figure>\n\n\n\n<p>Once initialization is complete, you will be greeted by the following interface:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"541\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/nessus-interface-1024x541.png\" alt=\"\" class=\"wp-image-172\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/nessus-interface-1024x541.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/nessus-interface-300x159.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/nessus-interface-768x406.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/nessus-interface-1536x812.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/nessus-interface-2048x1082.png 2048w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/nessus-interface-820x433.png 820w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Configuring the Network Adapter Settings<\/h2>\n\n\n\n<p>We are going to configure the network adapter setting for our machines so they can be on the same network to conduct the scan.<\/p>\n\n\n\n<p>Go to Network Manager by going to the <strong>Tools<\/strong> bar on the upper-left corner of VirtualBox, clicking on the three-bullet point icon, then clicking on <strong>Network<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"883\" height=\"126\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/tools.png\" alt=\"\" class=\"wp-image-258\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/tools.png 883w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/tools-300x43.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/tools-768x110.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/tools-820x117.png 820w\" sizes=\"(max-width: 883px) 100vw, 883px\" \/><\/figure>\n\n\n\n<p>We will create a new NAT Network. Go to the <strong>NAT Networks<\/strong> tab and click <strong>Create<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"988\" height=\"1024\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-network-adapter-988x1024.png\" alt=\"\" class=\"wp-image-259\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-network-adapter-988x1024.png 988w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-network-adapter-289x300.png 289w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-network-adapter-768x796.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-network-adapter-820x850.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-network-adapter.png 1329w\" sizes=\"(max-width: 988px) 100vw, 988px\" \/><\/figure>\n\n\n\n<p>Enter the following information under the <strong>General Options<\/strong> tab, then click <strong>Apply<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"927\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-nat-net-1024x927.png\" alt=\"\" class=\"wp-image-260\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-nat-net-1024x927.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-nat-net-300x272.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-nat-net-768x695.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-nat-net-820x742.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/create-nat-net.png 1333w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Now go to your Kali Linux network settings and copy the following configurations and click <strong>OK<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"863\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kali-net-1024x863.png\" alt=\"\" class=\"wp-image-261\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kali-net-1024x863.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kali-net-300x253.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kali-net-768x647.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kali-net-820x691.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/kali-net.png 1332w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Do the same for Metasploitable 2.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1004\" height=\"1024\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-net-1004x1024.png\" alt=\"\" class=\"wp-image-262\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-net-1004x1024.png 1004w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-net-294x300.png 294w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-net-768x784.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-net-820x837.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-net.png 1336w\" sizes=\"(max-width: 1004px) 100vw, 1004px\" \/><\/figure>\n\n\n\n<p>Now we will the check the IP configurations for each virtual machine to see if they are on the same network.<\/p>\n\n\n\n<p>Open the <strong>Terminal<\/strong> and type the command <em>ifconfig<\/em> for both the machines.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"465\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ifconfig-kali-1024x465.png\" alt=\"\" class=\"wp-image-263\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ifconfig-kali-1024x465.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ifconfig-kali-300x136.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ifconfig-kali-768x349.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ifconfig-kali-820x372.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ifconfig-kali.png 1450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-ifconfig.png\" alt=\"\" class=\"wp-image-264\" width=\"836\" height=\"468\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-ifconfig.png 729w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/meta-ifconfig-300x168.png 300w\" sizes=\"(max-width: 836px) 100vw, 836px\" \/><\/figure>\n\n\n\n<p>We have confirmed that they are on the same network. <\/p>\n\n\n\n<p>You can also use the <em>ping<\/em> command from Kali to verify connectivity to Metasploitable 2.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"416\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ping-from-kali-1024x416.png\" alt=\"\" class=\"wp-image-265\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ping-from-kali-1024x416.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ping-from-kali-300x122.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ping-from-kali-768x312.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ping-from-kali-820x334.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/ping-from-kali.png 1249w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Conducting the Scan<\/h2>\n\n\n\n<p>On the&nbsp;<strong>Scans<\/strong>&nbsp;page, you can create, view, and manage scans and resources. The left navigation bar shows the&nbsp;<strong>Folders<\/strong>&nbsp;and&nbsp;<strong>Resources<\/strong>&nbsp;sections. Create a scan by clicking <strong>New Scan<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"512\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/new-scan-1024x512.png\" alt=\"\" class=\"wp-image-269\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/new-scan-1024x512.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/new-scan-300x150.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/new-scan-768x384.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/new-scan-1536x767.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/new-scan-2048x1023.png 2048w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/new-scan-820x410.png 820w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Note:<\/strong>&nbsp;You cannot create scans while&nbsp;Nessus&nbsp;compiles plugins and this process takes a while to complete. You would know that because the <strong>New Scan<\/strong> button would be greyed out.<\/p>\n\n\n\n<p>When you first create a scan or policy, the&nbsp;<strong>Scan Templates<\/strong>&nbsp;section appears. Templates allow you to specify the type of scan you&#8217;re performing. They are sorted by the functionality that they provide.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"505\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-templates-1024x505.png\" alt=\"\" class=\"wp-image-270\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-templates-1024x505.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-templates-300x148.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-templates-768x379.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-templates-1536x758.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-templates-2048x1011.png 2048w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-templates-820x405.png 820w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Nessus&nbsp;provides three template categories:<\/p>\n\n\n\n<ol>\n<li><em>Discovery<\/em> &#8211; allows you to see what hosts are on your network including information such as IP address, FQDN, operating systems, and open ports, if available. After you have a list of hosts, you can choose what hosts you want to target in a vulnerability scan.<\/li>\n\n\n\n<li><em>Vulnerabilities<\/em> &#8211; recommended for most standard and day-to-day scanning needs. Tenable also publishes vulnerability scan templates that allow you to scan your network for a specific vulnerability or group of vulnerabilities. Tenable frequently updates the Nessus scan template library with templates that detect the latest vulnerabilities of public interest.<\/li>\n\n\n\n<li><em>Compliance<\/em> &#8211; also referred to as&nbsp;<em>configuration scans<\/em>, is recommended for checking whether host configurations are compliant with various industry standards. <\/li>\n<\/ol>\n\n\n\n<p><strong>Note: <\/strong>Since we are using a free version of Nessus (Nessus Essentials), we are not allowed to use Compliance scan templates, you need to upgrade to the paid version to use this feature.<\/p>\n\n\n\n<p>Knowing what hosts are on your network is the first step to any vulnerability assessment. We will launch a <em>host discovery<\/em> scan to see what hosts are on our network. Click on <strong>Host Discovery<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"496\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-discovery-1024x496.png\" alt=\"\" class=\"wp-image-273\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-discovery-1024x496.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-discovery-300x145.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-discovery-768x372.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-discovery-1536x743.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-discovery-2048x991.png 2048w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-discovery-820x397.png 820w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Enter a <strong>Name <\/strong>for the scan, you can also add a <strong>Description<\/strong> to provide specific details about the scan.<\/p>\n\n\n\n<p>For the <strong>Targets<\/strong>, you can enter hostnames, IPv4, or IPv6 addresses. I entered <strong>192.168.100.0\/24<\/strong>. This means that I want Nessus to scan my NAT Network 1 which is in the 192.168.100.0 network, as indicated by the \/24 CIDR notation. Click <strong>Launch<\/strong> to start the scan.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"420\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-dis-nat-1-1024x420.png\" alt=\"\" class=\"wp-image-276\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-dis-nat-1-1024x420.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-dis-nat-1-300x123.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-dis-nat-1-768x315.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-dis-nat-1-1536x631.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-dis-nat-1-820x337.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/host-dis-nat-1.png 2019w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This will perform a simple scan to discover live hosts and open ports.<\/p>\n\n\n\n<p><strong>Note: <\/strong>If you don&#8217;t want to launch the scan right away, you have the option to <strong>Save<\/strong> it for later.<\/p>\n\n\n\n<p>Now click on the <strong>NAT Network 1<\/strong> scan to see the results.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"183\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/done-w-scan-1024x183.png\" alt=\"\" class=\"wp-image-278\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/done-w-scan-1024x183.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/done-w-scan-300x54.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/done-w-scan-768x137.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/done-w-scan-1536x275.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/done-w-scan-820x147.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/done-w-scan.png 2017w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Here, we can see the results of the scan showing our two hosts; Kali Linux and Metasploitable 2 represented by their IPv4 addresses. We can also see the open ports.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"370\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-results-1024x370.png\" alt=\"\" class=\"wp-image-279\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-results-1024x370.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-results-300x108.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-results-768x278.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-results-1536x555.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-results-820x296.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/scan-results.png 2011w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Now, let&#8217;s do a basic network scan. A <em>basic network<\/em> scan essentially allows you to scan an asset or assets with all of Nessus&#8217;s plugins enabled. This scan provides a quick and easy way to scan assets for all vulnerabilities.<\/p>\n\n\n\n<p>Enter the information as shown in the image below. Keep in mind that the target <strong>192.168.100.5<\/strong> is the IP address assigned to Metasploitable 2. Click <strong>Launch<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"414\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-1024x414.png\" alt=\"\" class=\"wp-image-282\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-1024x414.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-300x121.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-768x311.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-1536x621.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-820x332.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan.png 2020w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>While waiting for the scan to finish, let&#8217;s talk a little bit about scan<em> Settings<\/em>, <em>Credentials<\/em>, and <em>Plugins<\/em>.<\/p>\n\n\n\n<p><em>Settings<\/em> enable you to refine parameters in scans to meet your specific network security needs. A scan settings&#8217; configurations greatly affect the scan&#8217;s capabilities, performance, and scan time. The scan settings you can configure vary depending on the scan template&nbsp;you selected. <\/p>\n\n\n\n<p>It is divided into 5 categories:&nbsp;<em>Basic<\/em>,&nbsp;<em>Discovery<\/em>,&nbsp;<em>Assessment<\/em>,&nbsp;<em>Report<\/em>, and&nbsp;<em>Advanced<\/em>.<\/p>\n\n\n\n<ol>\n<li>The&nbsp;<em>Basic<\/em>&nbsp;scan settings are used to specify certain organizational and security-related aspects of the scan, including the name of the scan, its targets, whether the scan is scheduled, and who has access to the scan. <\/li>\n\n\n\n<li>The <em>Discovery<\/em> settings determine the scan configuration&#8217;s discovery-related capabilities: host discovery, port scanning, and service discovery.<\/li>\n\n\n\n<li><em>Assessment<\/em> allows you to configure how the scan identifies vulnerabilities and which vulnerabilities the sensors identify. This includes identifying malware, assessing the vulnerability of a system to brute force attacks, and the susceptibility of web applications.<\/li>\n\n\n\n<li>The <em>Report<\/em> settings affect the verbosity and formatting of scan reports you can create for the scan configuration.<\/li>\n\n\n\n<li><em>Advanced<\/em> allows you to configure more general settings, performance options, and debugging capabilities among other things.<\/li>\n<\/ol>\n\n\n\n<p><em>Credentials<\/em> determine the credentials used for scanning an organization&#8217;s assets. Providing scanners with credentials (<em>credentialed scanning<\/em>) allows for scanning a large network and identifying local vulnerabilities that require specific access. Adding more credentials enables authentication of more assets but may prolong scan duration. Fully credentialed scans are preferred as they provide significantly more information for effective risk identification and prioritization.<\/p>\n\n\n\n<p><em>Plugins<\/em> allow you to enable or disable plugin families for the scan configuration. Enabling and disabling plugin families determines what security checks the scan does and does not perform. <\/p>\n\n\n\n<p>Now our basic network scan is complete. We can click on <strong>Metasploitable 2<\/strong> to see the results of the scan.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"189\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-result-1024x189.png\" alt=\"\" class=\"wp-image-288\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-result-1024x189.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-result-300x55.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-result-768x142.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-result-1536x284.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-result-820x151.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/Basic-Network-Scan-result.png 2014w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Here, we can see the results showing the huge number of vulnerabilities in our Metasploitable 2 virtual machine. Click on <strong>Vulnerabilities<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"426\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/results-info-1024x426.png\" alt=\"\" class=\"wp-image-289\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/results-info-1024x426.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/results-info-300x125.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/results-info-768x319.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/results-info-1536x638.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/results-info-820x341.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/results-info.png 2016w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Here we can see the vulnerabilities classified into <em>Critical<\/em>, <em>High<\/em>, and <em>Mixed<\/em>. You can also see the names of the specific vulnerabilities with their corresponding <em>CVSS<\/em> scores.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"545\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/list-of-vulnerabilities-1024x545.png\" alt=\"\" class=\"wp-image-290\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/list-of-vulnerabilities-1024x545.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/list-of-vulnerabilities-300x160.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/list-of-vulnerabilities-768x409.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/list-of-vulnerabilities-1536x818.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/list-of-vulnerabilities-820x436.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/list-of-vulnerabilities.png 2014w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Congratulations! You have successfully performed a vulnerability scan using Nessus.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>Vulnerability scanning plays a crucial role in vulnerability management by identifying and assessing potential security weaknesses within a system or network. It helps organizations proactively identify vulnerabilities before they can be exploited, enabling timely remediation. By regularly scanning and monitoring for vulnerabilities, organizations can enhance their security posture and reduce the risk of cyberattacks.<\/p>\n\n\n\n<p>In the next article, we will be interpreting the results of the vulnerability scan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article, we will be performing a vulnerability scan using Nessus, the leading vulnerability scanner. Before we start, let&#8217;s define a few important terms. What is a Vulnerability? A vulnerability is a weakness in the security of a system that can be exploited by a malicious entity to gain unauthorized access to, alter, or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,2,10],"tags":[12,11,5,9,8,7],"_links":{"self":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts\/153"}],"collection":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=153"}],"version-history":[{"count":50,"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts\/153\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts\/153\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}