Nessus ‐ Scans - mluchettii/internship-portfolio GitHub Wiki

Table of Contents

Host discovery scan

Configuration

Upon opening Nessus for the first time, the user is prompted to launch a host discovery scan to identify what hosts on the network are available to scan. In this case, I entered the gateway address of my LAN

To which all the hosts on my network were discovered. I then started a basic network scan of them all

Beginning of the scan...

Results

End of the scan. I checked what vulnerabilities I have for host 192.168.1.14, which is my personal Pi server

The highest vulnerability is for VNC Server Unauthenticated Access. For me, this is a non-issue because I know that my PiConnect service is password protected. Overall the scan shows nothing to be concerned about.

Nessus confirms that this alert may be ignored

Advanced scan

Configuration

This advanced scan will include all of the hosts on the VBox NAT Network (192.168.14.1/24)

Results

Mostly identical results as the earlier scan, minus the LAN hosts

Vulnerabilities and information for 192.168.14.2 host

mDNS Detection vulnerability, which can be fixed by filtering traffic to UDP port 5353