1 minute read

Vulnerability Scanning with Tenable Nessus

πŸš€ Day 3 of my #100DaysOfCybersecurity challenge is all about getting hands-on with Tenable Nessus! πŸ•΅οΈβ€β™‚οΈ

Just dived into this powerful cybersecurity tool developed by Tenable, Inc. It’s a go-to solution for vulnerability assessment and management.

Here’s a peek at what I was able to accomplish:

  • I downloaded and installed Nessus as a tool on my Kali Linux VM and then I initiated Basic Scans against two other devices on my home network:
    • πŸ’» Hulkβ€Š-β€Ša Windows 10 VM that is being used as a Universal Forwarder for sending WinEvent logs to my Splunk server
    • πŸ’» GNS3 Server VMβ€Š-β€Ša network simulator application that is running on a Linux Server VM



Here's what #Nessus can do:

πŸ’ͺ Benefits and Solutions:

  • πŸ” Vulnerability Assessment: It scans and assesses your systems, devices, and apps to pinpoint security weaknesses, known vulnerabilities, and misconfigurations. From servers to routers, it's got you covered.
  • βœ” Compliance Check: Helps meet regulations like PCI DSS, HIPAA, and NIST by finding non-compliance vulnerabilities.
  • ✳ Risk Analysis: Rates vulnerabilities by severity, so you can tackle the big problems first.
  • πŸ“ˆAsset Management: Keeps your asset inventory current, making management and security easier.
  • πŸ‘ŠπŸ½ Action Time: After scanning, prioritize, remediate, and monitor vulnerabilities.

The following resources were helpful for my learning activities:

  • πŸ“½ Josh Madakor's Nessus Scanning Tutorial: https://lnkd.in/ga7tCUNA
  • πŸ“½ The Cyber Mentor's Nessus Scanning Tutorial: https://lnkd.in/gQCF6hKP
  • πŸ“½ TryHackme: Nessus Scanning Lab: https://lnkd.in/guym5RV9

Stay tuned for more of my cybersecurity adventures! Follow me on LinkedIn!