Perform a vulnerability assessment of the local machine using Nessus Essentials, identify common security risks, and document findings with mitigation recommendations.
- Operating System: Kali Linux
- Tool: Nessus Essentials (Community Edition)
- Target: Localhost (127.0.0.1)
- Scan Type: Basic Network Scan
- Scanner Type: Local Scanner
- Policy: CVSS v3.0
- Target: 127.0.0.1
- Duration: ~8 minutes
- Status: Completed
Below are the screenshots captured during the scanning process:
| Severity | Count |
|---|---|
| Critical | 0 |
| High | 1 |
| Medium | 3 |
| Low | 8 |
| Info | 50+ |
Total Vulnerabilities Detected: 62
- Severity: High (CVSS 7.5)
- Description: A denial-of-service vulnerability exists in Ruby REXML before 3.4.2.
- Mitigation: Update Ruby REXML gem to version 3.4.2 or later.
- Severity: Medium
- Description: Multiple SSL/TLS weaknesses detected (deprecated protocols).
- Mitigation: Disable TLS 1.0/1.1 and weak ciphers in system configuration.
- Severity: Medium
- Description: Weak SSH algorithms or outdated configurations.
- Mitigation: Restrict SSH to strong ciphers such as AES-256-CTR and SHA2.
- Severity: Low
- Description: General information disclosure and outdated modules.
- Mitigation: Keep Apache packages updated and disable unused modules.
- Understood how Nessus Essentials performs vulnerability detection using CVE and CVSS scoring.
- Gained practical knowledge of network scanning and system-level security auditing.
- Learned to differentiate between vulnerability severities and prioritize remediation efforts.
- Vulnerability Scanning
- Risk Assessment
- CVSS (Common Vulnerability Scoring System)
- Remediation Practices
- Security Tool Configuration
Successfully completed a local vulnerability scan using Nessus Essentials on Kali Linux, identified 62 vulnerabilities, and documented findings with mitigations.
- Cybersecurity Intern β Task 3
- Your Name : DHANUSH S
- Date: 24 Oct 2025






