Skip to content

πŸ” Nessus Vulnerability Assessment – Localhost & Windows 10 VM This project demonstrates a hands-on vulnerability assessment using Tenable Nessus Essentials, focusing on both baseline (unauthenticated) and credentialed scans across a local host and a Windows 10 virtual machine environment.

Notifications You must be signed in to change notification settings

Krishcyber2005/Nessus-Vulnerability-Management-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

10 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Nessus Vulnerability Management Lab

Overview

This project demonstrates hands-on experience with vulnerability assessment and management using Tenable Nessus Essentials.
The lab focuses on identifying, analyzing, and documenting security vulnerabilities across both local and virtualized Windows environments.

Objectives

  • Install and configure Nessus Essentials
  • Perform baseline (unauthenticated) vulnerability scans
  • Perform credentialed vulnerability scans on Windows systems
  • Analyze vulnerability severity using CVSS v3
  • Document findings and scanning limitations

Environment

  • Host OS: Windows 10
  • Virtualization: Oracle VirtualBox
  • Target System: Windows 10 Virtual Machine
  • Scanner: Nessus Essentials (Local Scanner)

Scans Performed

1. Baseline Vulnerability Scan

  • Unauthenticated scan against localhost
  • Identified open ports, services, and informational findings
  • Established a baseline security posture

2. Credentialed Vulnerability Scan

  • Credentialed scan against Windows 10 VM
  • Attempted authenticated checks using administrative credentials
  • Authentication failed due to system security controls (realistic enterprise scenario)
  • Still produced meaningful vulnerability and service-level findings

Key Findings

  • Informational and medium-severity vulnerabilities detected
  • Service discovery and port scanning results analyzed
  • Demonstrates realistic challenges with credentialed scanning in secured environments

Tools & Skills Demonstrated

  • Nessus installation & plugin management
  • Vulnerability scanning methodologies
  • CVSS v3 severity analysis
  • Windows security configuration awareness
  • Vulnerability management documentation

Notes

Credentialed scan authentication failures are common in real-world environments due to firewall rules, SMB/RPC restrictions, and Group Policy settings.
This project documents those limitations transparently, reflecting real operational conditions.

Screenshots

All screenshots of installation, scan execution, and results are included in the /screenshots directory.

Author

Krish

About

πŸ” Nessus Vulnerability Assessment – Localhost & Windows 10 VM This project demonstrates a hands-on vulnerability assessment using Tenable Nessus Essentials, focusing on both baseline (unauthenticated) and credentialed scans across a local host and a Windows 10 virtual machine environment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published