JTCyberTech / Cybersecurity-Home-Labs

5 stars 1 forks source link

Part 8: Nessus Credential Scan #16

Open JTCyberTech opened 11 months ago

JTCyberTech commented 11 months ago

Performing Credential Scan on Nessus

Our Nessus credential configuration is in place. Let's now proceed to utilize Nessus credential scan and see if we can find more severe vulnerabilities.



- After Nessus finished scanning, a lot more vulnerabilities were found and some of them are critical and high level. - This time it found 40 vulnerabilities.



- We will look at the high level vulnerability related to Microsoft by clicking on the High Severe icon.



- We will take a look at the first vulnerability by clicking on it.



- From the description, we can see the CVE numbers and from that we can search it on Google if we want more details.



This experience underscores the effectiveness of Nessus, the vulnerability scanning tool. We will intentionally install outdated software to elicit more compelling insights when using Nessus.