This project documents a vulnerability assessment conducted using Tenable Nessus against multiple hosts in a simulated lab environment. The goal was to identify security weaknesses, evaluate their impact, and propose effective remediation strategies — similar to what a security engineer would do in a real organization.
- Scan a defined set of network assets for known vulnerabilities
- Analyze and classify findings (e.g., CVEs, CVSS scores)
- Document remediation strategies for high- and critical-risk items
- Practice secure scanning techniques in a controlled environment
| Element | Details |
|---|---|
| Tool | Nessus Essentials (Tenable) |
| Targets | Windows 10 VM, Ubuntu Server, pfSense |
| Network Type | Isolated lab using VirtualBox |
| Scan Policy | Basic Network Scan + Custom Config |
| Scanner Host | Kali Linux 2024.1 VM |
See targets/asset-inventory.csv and targets/scan-scope.md
| Hostname | OS | Role | IP Address |
|---|---|---|---|
| win10-lab | Windows 10 | Workstation | 192.168.1.10 |
| ubuntu-web | Ubuntu 22.04 | Web Server (Apache) | 192.168.1.20 |
| pfsense-fw | pfSense | Firewall/Gateway | 192.168.1.1 |
| Severity | # of Vulnerabilities |
|---|---|
| Critical | 3 |
| High | 12 |
| Medium | 19 |
| Low | 21 |
| Info | 30+ |
Detailed list available in
reports/high-critical-findings.md
| Plugin ID | Title | CVSS | Affected Host |
|---|---|---|---|
| 42873 | SMB Signing not required | 10.0 | win10-lab |
| 90536 | Apache HTTP Server 2.4.49 RCE (CVE-2021-41773) | 9.8 | ubuntu-web |
| 19506 | Nessus Scan Information | Info | All hosts |
See remediation/remediation-plan.md
Example actions:
- Enable SMB Signing via GPO
- Patch Apache to ≥2.4.51
- Disable unused ports and services
- Schedule monthly vulnerability scans
Example of Nessus scan results overview
| File | Purpose |
|---|---|
reports/nessus-scan-report.pdf |
Exported Nessus report |
scan-policy.json |
JSON of scan policy config |
high-critical-findings.md |
Summary of highest-risk issues |
remediation-plan.md |
Step-by-step remediation guide |
This assessment was conducted in a private, isolated lab. Do not scan any public or unauthorized networks with Nessus without explicit permission. This project is strictly educational and ethical.
Created by Rakeem
GitHub: @yourhandle
LinkedIn: https://www.linkedin.com/in/rakeemdawson/