8 min readApr 8, 2025

Hello Cybersecurity enthusiasts, today I’m going to showcase a demo of a project which involves scanning vulnerabilities using **Nessus. **Now for the ones who don’t know what Nessus is, it is a vulnerability scanner used to scan a network / IP / domain to map any existing vulnerabilities to the already discovered ones out there.

Note: Using Nessus on any network / IP/ domain without having proper permission is **illegal!! **So in this blog, I’m going to show you running this scanner against **Metasploitable 2 **which is a vulnerable machine and is usually used for penetration testing purposes.

Prerequisites: A Kali Linux Virtual Machine (This is inevitable), A Metasploitable 2 Virtual Machine (Here is the link to download one: [Download Metasploita…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help