Nessus ‐ Scans - mluchettii/internship-portfolio GitHub Wiki
Table of Contents
Host discovery scan
Configuration
Upon opening Nessus for the first time, the user is prompted to launch a host discovery scan to identify what hosts on the network are available to scan. In this case, I entered the gateway address of my LAN
To which all the hosts on my network were discovered. I then started a basic network scan of them all
Beginning of the scan...
Results
End of the scan. I checked what vulnerabilities I have for host 192.168.1.14, which is my personal Pi server
The highest vulnerability is for VNC Server Unauthenticated Access. For me, this is a non-issue because I know that my PiConnect service is password protected. Overall the scan shows nothing to be concerned about.
Nessus confirms that this alert may be ignored
Advanced scan
Configuration
This advanced scan will include all of the hosts on the VBox NAT Network (192.168.14.1/24)
Results
Mostly identical results as the earlier scan, minus the LAN hosts
Vulnerabilities and information for 192.168.14.2 host
mDNS Detection vulnerability, which can be fixed by filtering traffic to UDP port 5353