Thanks to visit codestin.com
Credit goes to github.com

Skip to content

X30G/Nessus-Basic-Network-Scan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

31 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” Nessus Vulnerability Scan on Metasploitable3

Basic Nessus network vulnerability scan

Tools & Platforms: Nessus, Metasploitable3, Kali Linux, VirtualBox

This project demonstrates a basic network vulnerability scan using Tenable Nessus 10.9.1 against a vulnerable virtual machine, Metasploitable3, as the target. It’s designed to showcase the ability to identify, assess, and report on potential security issues in a controlled lab environment.


🎯 Project Purpose

This is a demonstration project for:

  • Practicing vulnerability assessment skills.
  • Showcasing network scanning using professional-grade tools.
  • Sharing a reproducible workflow for cybersecurity learning.

Target audience: Recruiters, home lab enthusiasts, and the broader infosec community.


🧰 Tools & Environment

Tool Details
Host OS Kali Linux (running Nessus)
Target VM Metasploitable3
Scanner Tenable Nessus
Virtualization VirtualBox
Network Setup Host-only Adapter (vboxnet0) + NAT

βš™οΈ Lab Setup Overview

The lab consists of two VMs running inside VirtualBox:

  1. Kali Linux (Nessus Installed) – the scanner.
  2. Metasploitable3 – the target.

Networking:

  • Host-Only Adapter (vboxnet0) for direct communication between VMs.
  • NAT Adapter for internet access and Nessus plugin updates.

This setup isolates the vulnerable machine from the broader internet while allowing the scanner to reach it locally.


πŸš€ Scan Details

  • Nessus Template: Basic Network Scan
  • Target: Metasploitable3 local IP (e.g., 192.168.x.x)
  • Port Range: 1 - 65535 (full TCP port scan)
  • Authentication: None (unauthenticated scan)

πŸ“Έ Results & Deliverables

Included in this repository:

  • πŸ“„ Scan Report (PDF) Nessus Report
  • πŸ–ΌοΈ Screenshots of the Nessus scan process and findings screenshots
  • πŸ“ Setup notes for replicating the environment

πŸ” Replication Guide

While this lab uses VirtualBox, the scan can be replicated using any virtualization platform that supports custom network adapters.

Ensure your scanner (Kali + Nessus) and target (Metasploitable3) are on the same host-only network.


πŸ›‘οΈ Disclaimer

This lab is for educational and demonstration purposes only. Never run vulnerability scans on systems you do not own or have explicit permission to test.


About

Basic Nessus vulnerability scan with default settings

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published