This section demonstrate the process of using Nessus to scan a system for potential vulnerabilities and produce a report.
Step1: Obtain the Host IP address and Start Nessus Vulenerability Application
Step 2: Open your web browser and launch Nessus Essential. Then, enter your login credentials to access the platform.
Step 3: Click on the New Scan button to start a new vulnerability scan.
Step 4: Choose from various scan types, but for the purpose of this demonstration, we will be specifically using the Basic Network Scan. Therefore, please click on the Basic Network Scan option to proceed.
Step 5: In the Settings Tab, enter the name, description, and target(s) IP address(es) in the designated text area for targets from the General Tab.
Step 6: Move to Discovery Tab and select all port scan type(Note: You can also select your desire option)
Please note that you also have the option to click on the Custom Scan Type button to explore other types of scans such as Brute-Force, Web Application, Windows, and Database Scans.
Step 7: Once you have configured all the necessary settings, click on the Save button. Then, click on the play icon to initiate the scanning process.
Step 7: After the scanning process is completed, you can view the results and analyze any vulnerabilities that were found. You should then perform the necessary remediation actions to address these vulnerabilities in order to prevent exploiting the found vulnerabilties.
Finally, you have the option to export the vulnerability report in HTML, CSV, or PDF format. The report for this walkthrough is attached to this repository. You can visit the following link: https://github.com/mukaz4god/Exploiting-EternalBlue-MS17-010-Vulnerability for a walkthrough on how to exploit one of the vulnerabilities that were found in this demonstration.
--------------------- THANK YOU ---------------------------