Top 5 This Week

Related Posts

Kali Linux – Vulnerability Analysis: Deep Dive into Nessus Essentials

Getting your Trinity Audio player ready...

Kali Linux – Vulnerability Analysis: Deep Dive into Nessus Essentials

Explore the realms of network security with our comprehensive guide on ‘Kali Linux – Vulnerability Analysis’ using Nessus Essentials.

Setting Up Nessus Essentials for Kali Linux

Learn the step-by-step process of setting up Nessus Essentials on Kali Linux, a vital tool for vulnerability analysis.

Installation and Initial Configuration

Start your journey into cybersecurity analysis by installing Nessus Essentials on your Kali Linux system.

    Registering and Preparing Nessus Essentials

    Understand the process of registering Nessus Essentials and preparing your system for comprehensive network scans.

      Conducting a Vulnerability Analysis

      With Nessus Essentials set up, delve into conducting a detailed vulnerability analysis on your network.

      Initiating the Network Scan

      Discover how to initiate a network scan, from selecting scan types to targeting specific network segments.

        Analyzing Scan Results

        Interpret and analyze the results from Nessus Essentials to identify potential vulnerabilities and security gaps.

          Step-by-Step detailes



          Setup and Configuration:

          • Download Nessus Essentials 8.15.1 from:
          • choose: Nessus-8.15.1-debian6_amd64.deb | Debian 9, 10 / Kali Linux 1, 2017.3, 2018, 2019, 2020 AMD64
          • to install, open terminal in the Download directory and type: sudo dpkg -i Nessus-8.15.1-debian6_amd64.deb
          • after installation to start Nessus: sudo /bin/systemctl start nessusd.service
          • to use Nessus, browser: https://kali:8834/ (Accept the browser warnings)
          • register with name and business email (real) so that you can receive the single use Serial Number (recommended to obtain the SN using the webpage request process)
          • with the SN received in email continue the setup process
          • setup a new username and password
          • after all this expect 1 hoour of downloading and compiling the required modules (I suggest to temporary allocate more ram and vcpu to the kali vm :D )


          • Click on “new scan” buton
          • with the free version you can only scan 16 IP addresses (this will reset after 90 days)
          • on Basic Tab select “Basic Network Scan” in name: Metasploitable and in Targets insert the IP addrss of the Metasploitable vm
          • on Discovery tab select Scan type: Port scan (all ports)
          • on Assessement tab select Scan for known web vulnerabilities – or a more intensive option
          • Click Save and then Launch it by clicking the Play symbol


          This guide provides an in-depth look into conducting vulnerability analysis using Nessus Essentials in Kali Linux, empowering you with essential skills for cybersecurity assessment.

          Cogeanu Marius
          Cogeanu Marius
          Marius Cogeanu is a distinguished IT consultant and cybersecurity virtuoso based in Prague, Czechia. With a rich 20-year journey in the IT realm, Marius has carved a niche in network security and technological solutions, adeptly harmonizing tech with business requirements. His experience spans from Kyndryl to IBM, and as a valued independent consultant, where he's renowned for his innovative approaches in enhancing business operations with cutting-edge tech.Marius's forte lies in demystifying complex IT concepts, ensuring clarity and alignment for stakeholders at all levels. His commitment to staying at the forefront of industry trends and seeking innovative solutions cements his status as a go-to expert in cybersecurity. Driven by a fervent passion for technology and its potential to revolutionize businesses, Marius thrives on tackling challenging ventures, applying his prowess in network design, IT service management, and strategic planning.Currently, Marius is focused on leading-edge IT project management, infrastructure design, and fortifying cybersecurity, guiding clients through the intricate digital landscape with unmatched expertise and insight.Discover more on

          LEAVE A REPLY

          Please enter your comment!
          Please enter your name here

          Popular Articles