SlideShare a Scribd company logo
A Practical Guide
Vulnerability Scanning

with Nessus
www.infosectrain.com
www.infosectrain.com
Vulnerability Scanning with Nessus

A Practical Guide
What is Nessus?
Q
Nessus, developed by Tenable, is a powerful vulnerability scanner trusted by
organizations worldwide to identify vulnerabilities in their IT infrastructure. It scans
networks, servers, and applications to detect weaknesses that attackers could
exploit. Nessus Professional is widely used in enterprise environments, while
Nessus Essentials (formerly Nessus Home) is available for personal use, offering
limited scanning capabilities for home networks.
Why Nessus?

The appeal of Nessus lies in its robust scanning engine, ease of use, and
comprehensive coverage of vulnerabilities. It has one of the most extensive
vulnerability databases, which is regularly updated to include the latest security
issues. The scanner is capable of identifying misconfigurations, missing
patches, default credentials, and more—making it an invaluable tool for security
professionals.
Setting Up Nessus
Download and Install Nessus:

Visit the to download the version suitable for your needs—
Nessus Professional for business users or Nessus Essentials for home use.
Tenable website
www.infosectrain.com 1 | Page
Installation
For installation, open the terminal and go to the download directory.
www.infosectrain.com 2 | Page
Vulnerability Scanning with Nessus

A Practical Guide
For installation, use the following command :

# dpkg -i Nessus-10.8.3-ubuntu1604_amd64.deb


Start the nessus service-

# service nessusd start 


And for confirming whether the nessus service has been started or not, we can
confirm it with:

# service nessusd status
www.infosectrain.com 3 | Page
Vulnerability Scanning with Nessus

A Practical Guide
Activate Your License:

you’ll need to activate your license. Nessus Essentials requires a free license
key, while Nessus Professional comes with a paid license and a free trial of 7
days.


Configuration by using the command

#service nessusd start

#service nessusd status
For setup, click on the checkbox register offline and then continue
www.infosectrain.com 4 | Page
Vulnerability Scanning with Nessus

A Practical Guide
www.infosectrain.com 5|Page
VulnerabilityScanningwithNessus

APracticalGuide
Create new user account by giving user id and password
www.infosectrain.com 6 | Page
Vulnerability Scanning with Nessus

A Practical Guide
Set Up the Scanner:

Once Nessus is installed, you will be prompted to configure the scanner. You
can choose from various scan types depending on your objectives (e.g.,
vulnerability assessment, compliance scans, or custom configurations).
1 Performing a Vulnerability Scan with Nessus
To start using Nessus Professional, you'll need to access the Nessus
Professional dashboard through your web browser. By default, the Nessus
Professional service runs on port 8834, so you can access it using the
following URL:
https://localhost:8834/
Log in with your Nessus Professional credentials to access the dashboard.
www.infosectrain.com 7 | Page
Vulnerability Scanning with Nessus

A Practical Guide
2 Create a New Scan
Once you're logged in, click on the “New Scan” button to initiate a scan.
Nessus Professional offers several templates to choose from, depending on
your requirements
Basic Network Scan: A general vulnerability scan for networks
Advanced Scan: Provides detailed control over scan parameters
Web Application Test: Designed to identify vulnerabilities in web
applications.

For our example, let's assume you want to perform a Basic Network Scan
Navigate to the Scans tab
Click on New Scan
Select Basic Network Scan from the list of available templates.
3 Configure Scan Settings
Once you select a scan template, you will need to configure the scan settings.
This includes specifying your target, scan schedule, and any additional options
like port ranges or scan timeouts.
Steps
Name: Provide a descriptive name for your scan (e.g., "Internal Network Scan")
Target: Enter the target(s) for the scan.
www.infosectrain.com 8 | Page
Vulnerability Scanning with Nessus

A Practical Guide
Range of IP Addresses
Set up the scan with the target IP, specify the project name along with a
detailed description, and ensure all output is saved to your "scan" folder.
Port Range: If you want to scan a specific range of ports, configure the Port
Range field. For example, to scan common ports: 1-1024, 8080, 8443
www.infosectrain.com 9 | Page
Vulnerability Scanning with Nessus

A Practical Guide
Schedule: If you want to automate the scan, you can set it to run periodically
(e.g., daily or weekly) under the Schedule tab. Daily Scan (scheduled at 6:30
PM every day):
Configure Authentication: If your scan targets servers or devices requiring
authentication, you can configure credentials such as SSH or SMB to gain
deeper insights. Here’s how to specify credentials in the scan configuration:
SSH Authentication:
www.infosectrain.com 10 | Page
Vulnerability Scanning with Nessus

A Practical Guide
4 Run the Scan
After configuring the scan settings, you're ready to launch the scan. Nessus
Professional will immediately begin scanning the target network, and the time
required will vary based on the network’s size and complexity
Click Save to save the scan configuration
Click Launch to start the scan immediately.
5 Monitor the Scan Progress
Once the scan is launched, Nessus Professional will display the progress in
real-time within the web interface. The status bar will show how far along the
scan is, and once completed, the results will be available for review.


You can view the scan progress under the Scans tab, where you will see the
percentage of the scan completed, the time elapsed, and the number of
vulnerabilities detected so far.
www.infosectrain.com 11 | Page
Vulnerability Scanning with Nessus

A Practical Guide
6 View and Analyze Scan Results
After the scan is completed, Nessus Professional will generate a
comprehensive report outlining the vulnerabilities discovered. Each
vulnerability will be categorized by its severity:

Download Scan Results in CSV Format:
www.infosectrain.com 12 | Page
Vulnerability Scanning with Nessus

A Practical Guide
7 Exporting Results
You can export the scan results in different formats from the Nessus
Professional web interface by following these steps
Open the scan results page
Click on Export
Choose the desired format (e.g., PDF, CSV, HTML)
Save the file to your desired location.
8 Remediation and Continuous Scanning
Once vulnerabilities are identified, prioritize remediation based on their severity.
After addressing the critical vulnerabilities, you can continuously monitor the
environment by scheduling periodic scans.


Following these steps allows you to conduct an effective vulnerability scan
using Nessus Professional, helping you secure your network against potential
threats. Regular scans and diligent remediation are key components in
maintaining a secure and resilient network environment.
www.infosectrain.com 13 | Page
Vulnerability Scanning with Nessus

A Practical Guide
Contact us
sales@infosectrain.com
www.infosectrain.com
Keep Learning with
Follow us on

More Related Content

PDF
Nessus Software
PDF
tenable Nessus_10_5.pdf
PPSX
20210906-Nessus-FundamentalInfoSec.ppsx
PPTX
Nessus-Vulnerability Tester
PDF
Network Security Tools
PDF
API Training 10 Nov 2014
PDF
Enterprise Vulnerability Management - ZeroNights16
Nessus Software
tenable Nessus_10_5.pdf
20210906-Nessus-FundamentalInfoSec.ppsx
Nessus-Vulnerability Tester
Network Security Tools
API Training 10 Nov 2014
Enterprise Vulnerability Management - ZeroNights16

Similar to Vulnerability Scanning with Nessus A Practical Guide (20)

PDF
Nessus is a network security toolIn a pragraph describe how it is .pdf
PDF
Web_Application_Vul_Testing_with_Nessus_2012.02.01.pdf
DOCX
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
PDF
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
DOCX
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
DOCX
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
PPTX
Demo of security tool nessus - Network vulnerablity scanner
PPTX
Introduction to cyber security three .pptx
PDF
Vulnerability scanning report by Tareq Hanaysha
PPTX
Introduction Vulnerability assessment and penetration testing.pptx
PPTX
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
DOCX
httpscdnapisec.kaltura.comindex.phpextwidgetpreviewpartner_.docx
PDF
Vulnerability Management V0.1
PDF
Nessus Assesment Vulnerability Management.pdf
DOCX
JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURA.docx
PDF
Nessus Basics
PPTX
Introduction to cyber security
PDF
Vulnerability assessment-info-savvy
PDF
5 howtomitigate
PDF
CEH v12 Lesson 5 _ Vulnerability Assessment To (1).pdf
Nessus is a network security toolIn a pragraph describe how it is .pdf
Web_Application_Vul_Testing_with_Nessus_2012.02.01.pdf
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
Nessus is a network security toolIn a pragraph describe the tool’s.pdf
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
Demo of security tool nessus - Network vulnerablity scanner
Introduction to cyber security three .pptx
Vulnerability scanning report by Tareq Hanaysha
Introduction Vulnerability assessment and penetration testing.pptx
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
httpscdnapisec.kaltura.comindex.phpextwidgetpreviewpartner_.docx
Vulnerability Management V0.1
Nessus Assesment Vulnerability Management.pdf
JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURA.docx
Nessus Basics
Introduction to cyber security
Vulnerability assessment-info-savvy
5 howtomitigate
CEH v12 Lesson 5 _ Vulnerability Assessment To (1).pdf
Ad

More from priyanshamadhwal2 (20)

PDF
CRISC 100 Days study plan By InfosecTrain.pdf
PDF
Red Team Expert Interview questions and answers
PDF
Tips to Secure Your Cloud Infranstructure
PDF
CISA Domain Wise Summary By InfosecTrain
PDF
How Cyberterrorism Can Cripple a nation By InfosecTrain
PDF
Dev plus Security The most wanted Tech skill in 2025.pdf
PDF
Black Window Stealth Mastering Ethical Hacking Techniques
PDF
World Wide Web Day From Connection to Transformation
PDF
OSI Model Vs TCP IP Know the layers, master the network By Infosectrain
PDF
Top 10 Network Security Solutions by Infosectrain
PDF
Digital Forensic Investigator Top Interview Questions and answers
PDF
Advance Cloud Security Governance Training By InfosecTrain.pdf
PDF
Crowdstrike Day Carousel By InfosecTrain
PDF
Internal Audit Interview Questions and Answers
PDF
How generative AI is powering Business Transformation
PDF
CEH Module 3 Mind Map of Scanning Networks By InfosecTrain
PDF
PCI DSS Implementation Training By InfosecTrain
PDF
Understanding LLMs in Business Operations By Infosectrain
PDF
CISA Certified Information Systems Auditor 100 Days study plan by Infosectrain
PDF
Three Lines of Defense Marriage Edition By InfosecTrain
CRISC 100 Days study plan By InfosecTrain.pdf
Red Team Expert Interview questions and answers
Tips to Secure Your Cloud Infranstructure
CISA Domain Wise Summary By InfosecTrain
How Cyberterrorism Can Cripple a nation By InfosecTrain
Dev plus Security The most wanted Tech skill in 2025.pdf
Black Window Stealth Mastering Ethical Hacking Techniques
World Wide Web Day From Connection to Transformation
OSI Model Vs TCP IP Know the layers, master the network By Infosectrain
Top 10 Network Security Solutions by Infosectrain
Digital Forensic Investigator Top Interview Questions and answers
Advance Cloud Security Governance Training By InfosecTrain.pdf
Crowdstrike Day Carousel By InfosecTrain
Internal Audit Interview Questions and Answers
How generative AI is powering Business Transformation
CEH Module 3 Mind Map of Scanning Networks By InfosecTrain
PCI DSS Implementation Training By InfosecTrain
Understanding LLMs in Business Operations By Infosectrain
CISA Certified Information Systems Auditor 100 Days study plan by Infosectrain
Three Lines of Defense Marriage Edition By InfosecTrain
Ad

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
master seminar digital applications in india
PDF
Insiders guide to clinical Medicine.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
Microbial disease of the cardiovascular and lymphatic systems
TR - Agricultural Crops Production NC III.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
RMMM.pdf make it easy to upload and study
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
01-Introduction-to-Information-Management.pdf
Renaissance Architecture: A Journey from Faith to Humanism
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
master seminar digital applications in india
Insiders guide to clinical Medicine.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Abdominal Access Techniques with Prof. Dr. R K Mishra
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPH.pptx obstetrics and gynecology in nursing
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
2.FourierTransform-ShortQuestionswithAnswers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Microbial diseases, their pathogenesis and prophylaxis

Vulnerability Scanning with Nessus A Practical Guide

  • 1. A Practical Guide Vulnerability Scanning with Nessus www.infosectrain.com www.infosectrain.com
  • 2. Vulnerability Scanning with Nessus A Practical Guide What is Nessus? Q Nessus, developed by Tenable, is a powerful vulnerability scanner trusted by organizations worldwide to identify vulnerabilities in their IT infrastructure. It scans networks, servers, and applications to detect weaknesses that attackers could exploit. Nessus Professional is widely used in enterprise environments, while Nessus Essentials (formerly Nessus Home) is available for personal use, offering limited scanning capabilities for home networks. Why Nessus? The appeal of Nessus lies in its robust scanning engine, ease of use, and comprehensive coverage of vulnerabilities. It has one of the most extensive vulnerability databases, which is regularly updated to include the latest security issues. The scanner is capable of identifying misconfigurations, missing patches, default credentials, and more—making it an invaluable tool for security professionals. Setting Up Nessus Download and Install Nessus: Visit the to download the version suitable for your needs— Nessus Professional for business users or Nessus Essentials for home use. Tenable website www.infosectrain.com 1 | Page
  • 3. Installation For installation, open the terminal and go to the download directory. www.infosectrain.com 2 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 4. For installation, use the following command : # dpkg -i Nessus-10.8.3-ubuntu1604_amd64.deb Start the nessus service- # service nessusd start  And for confirming whether the nessus service has been started or not, we can confirm it with: # service nessusd status www.infosectrain.com 3 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 5. Activate Your License: you’ll need to activate your license. Nessus Essentials requires a free license key, while Nessus Professional comes with a paid license and a free trial of 7 days. 
 Configuration by using the command #service nessusd start #service nessusd status For setup, click on the checkbox register offline and then continue www.infosectrain.com 4 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 7. Create new user account by giving user id and password www.infosectrain.com 6 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 8. Set Up the Scanner: Once Nessus is installed, you will be prompted to configure the scanner. You can choose from various scan types depending on your objectives (e.g., vulnerability assessment, compliance scans, or custom configurations). 1 Performing a Vulnerability Scan with Nessus To start using Nessus Professional, you'll need to access the Nessus Professional dashboard through your web browser. By default, the Nessus Professional service runs on port 8834, so you can access it using the following URL: https://localhost:8834/ Log in with your Nessus Professional credentials to access the dashboard. www.infosectrain.com 7 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 9. 2 Create a New Scan Once you're logged in, click on the “New Scan” button to initiate a scan. Nessus Professional offers several templates to choose from, depending on your requirements Basic Network Scan: A general vulnerability scan for networks Advanced Scan: Provides detailed control over scan parameters Web Application Test: Designed to identify vulnerabilities in web applications. For our example, let's assume you want to perform a Basic Network Scan Navigate to the Scans tab Click on New Scan Select Basic Network Scan from the list of available templates. 3 Configure Scan Settings Once you select a scan template, you will need to configure the scan settings. This includes specifying your target, scan schedule, and any additional options like port ranges or scan timeouts. Steps Name: Provide a descriptive name for your scan (e.g., "Internal Network Scan") Target: Enter the target(s) for the scan. www.infosectrain.com 8 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 10. Range of IP Addresses Set up the scan with the target IP, specify the project name along with a detailed description, and ensure all output is saved to your "scan" folder. Port Range: If you want to scan a specific range of ports, configure the Port Range field. For example, to scan common ports: 1-1024, 8080, 8443 www.infosectrain.com 9 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 11. Schedule: If you want to automate the scan, you can set it to run periodically (e.g., daily or weekly) under the Schedule tab. Daily Scan (scheduled at 6:30 PM every day): Configure Authentication: If your scan targets servers or devices requiring authentication, you can configure credentials such as SSH or SMB to gain deeper insights. Here’s how to specify credentials in the scan configuration: SSH Authentication: www.infosectrain.com 10 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 12. 4 Run the Scan After configuring the scan settings, you're ready to launch the scan. Nessus Professional will immediately begin scanning the target network, and the time required will vary based on the network’s size and complexity Click Save to save the scan configuration Click Launch to start the scan immediately. 5 Monitor the Scan Progress Once the scan is launched, Nessus Professional will display the progress in real-time within the web interface. The status bar will show how far along the scan is, and once completed, the results will be available for review. You can view the scan progress under the Scans tab, where you will see the percentage of the scan completed, the time elapsed, and the number of vulnerabilities detected so far. www.infosectrain.com 11 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 13. 6 View and Analyze Scan Results After the scan is completed, Nessus Professional will generate a comprehensive report outlining the vulnerabilities discovered. Each vulnerability will be categorized by its severity: Download Scan Results in CSV Format: www.infosectrain.com 12 | Page Vulnerability Scanning with Nessus A Practical Guide
  • 14. 7 Exporting Results You can export the scan results in different formats from the Nessus Professional web interface by following these steps Open the scan results page Click on Export Choose the desired format (e.g., PDF, CSV, HTML) Save the file to your desired location. 8 Remediation and Continuous Scanning Once vulnerabilities are identified, prioritize remediation based on their severity. After addressing the critical vulnerabilities, you can continuously monitor the environment by scheduling periodic scans. Following these steps allows you to conduct an effective vulnerability scan using Nessus Professional, helping you secure your network against potential threats. Regular scans and diligent remediation are key components in maintaining a secure and resilient network environment. www.infosectrain.com 13 | Page Vulnerability Scanning with Nessus A Practical Guide