This project demonstrates the complete installation, configuration, execution, and analysis of a vulnerability scan using Tenable Nessus Essentials on Kali Linux.
The scan was performed against:
Target: 127.0.0.1 (Localhost)
Scan Type: Basic Network Scan
Scanner: Local Scanner
Duration: 41 Minutes
- Environment Details
- Installation Process
- Service Verification
- Plugin Update Process
- Scan Configuration
- Scan Execution
- Scan Results
- High Severity Analysis
- Remediation Actions
- Conclusion
| Component | Value |
|---|---|
| OS | Kali Linux |
| Nessus Version | 10.11.2 (#42) Linux |
| License | Nessus Essentials |
| Scan Target | 127.0.0.1 |
| Policy | Basic Network Scan |
Download the Debian package from Tenable:
Nessus-10.11.2-debian10_amd64.deb
sudo dpkg -i Nessus-10.11.2-debian10_amd64.debSuccessful installation message:
INSTALL PASSED
You can start Nessus Scanner by typing:
systemctl start nessusd.service
Start and verify Nessus service:
sudo systemctl start nessusd
sudo systemctl status nessusdExpected Status:
Active (running)
Initially, plugin download failed due to DNS/network issues.
After resolving:
sudo /opt/nessus/sbin/nessuscli updateFinal Status:
Nessus Plugins: Complete
Nessus Core Components: Complete
https://127.0.0.1:8834
Template Selected:
Basic Network Scan
| Field | Value |
|---|---|
| Name | Localhost Scan |
| Target | 127.0.0.1 |
| Folder | My Scans |
Launch scan from dashboard.
Scan Details:
- Status: Completed
- Start Time: 6:13 AM
- End Time: 6:54 AM
- Duration: 41 Minutes
Total Vulnerabilities Detected:
60
Severity Breakdown:
- 🔴 High: 3
- 🟠 Medium: 2
- 🔵 Info: Remaining
| Field | Value |
|---|---|
| Severity | High |
| CVSS v3.0 | 7.5 |
| CVE | CVE-2025-6176 |
| Installed Version | 1.1.0 |
| Fixed Version | 1.2.0 |
Affected Path:
/usr/lib/python3/dist-packages/Brotli-1.1.0.egg-info
- Nessus successfully installed and configured.
- Plugin updates completed after network troubleshooting.
- Localhost scan executed successfully.
- 60 vulnerabilities detected.
- 3 High severity vulnerabilities identified.
- Immediate update required for Brotli package.
- Proper DNS configuration is critical for plugin updates.
- Nessus Essentials supports up to 5 hosts.
- Localhost scanning reveals installed package vulnerabilities.
- Regular patch management is essential.
- Nessus Essentials
- Licensed Hosts: 0 of 5 used
- Expiration: March 17, 2026
This project demonstrates a full vulnerability assessment lifecycle using Nessus Essentials:
- Installation
- Configuration
- Scanning
- Analysis
- Remediation planning
The identified vulnerabilities highlight the importance of maintaining updated system libraries to prevent denial-of-service and exploitation risks.