Skip to content

VirtualBox networking, Nessus Essentials setup, target VM Metasploitable

Notifications You must be signed in to change notification settings

PRENGARA/Vulnerability-Scan-Nessus

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

Vulnerability-Scan-Nessus

VirtualBox networking, Nessus Essentials setup, target VM Metasploitable

Vulnerability Scanning with Nessus Essentials

This repository documents Priyadharshini Rengaramanujam's Lab: configuring VirtualBox networking, scanning a vulnerable VM (Metasploitable 2) from an attacker PC with Nessus Essentials, and reporting findings with remediation recommendations.

Contents

  • report/Rengaramanujam-Priyadharshini-Lab.pdf — Scan evidence: IPs, screenshots, vulnerability summary by severity, and two critical fix recommendations.
  • BLOG.md — Lessons learned from running and interpreting vulnerability scans.

Lab Highlights

  • Attacker PC (Windows 10/11) runs Nessus on https://localhost:8834/ and scans target VM over host-only network.
  • Target VM: Metasploitable 2, discovered services and known exposures (e.g., UnrealIRCd backdoor, deprecated SSL v2/v3, weak VNC, NFS/rlogin/rsh).

Author

Priyadharshini Rengaramanujam

About

VirtualBox networking, Nessus Essentials setup, target VM Metasploitable

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published