Skip to content

adeshrr/nessus-vulnerability-scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Nessus Vulnerability Scanner Project

This project simulates real-world vulnerability scanning using Tenable Nessus Essentials, with multiple scan stages and misconfigurations to show increasing security risk.


Lab Setup

  • VirtualBox + 2 Windows VMs
  • Nessus scanner (with credentials)
  • Target system with old Chrome, 7-Zip, Minecraft Server

Scan Stages

Stage Description
🔹 Scan 1 Default settings – Remote Registry off, UAC on
🔹 Scan 2 System configured – Remote Registry on, UAC off
🔹 Scan 3 Vulnerable apps installed – real CVEs detected

Screenshots

Scan 1 – Default

Scan 2 – Configured

Scan 3 – Vulnerable Apps


Contents

  • README.md – Main description
  • nessus-project-summary.md – Detailed explanation of steps
  • registry-config.txt – Manual changes done
  • screenshots/ – Visual proof

Skills Demonstrated: Nessus scanning, system hardening, CVE detection

** NOTE:** All scans were done in a safe, isolated virtual environment.

Remediation Recommendations

Below are the suggested remediation actions for the vulnerabilities discovered during the scans:

Common Fixes:

  • Apply all missing Windows updates and patches
  • Enable Windows Defender or another endpoint protection
  • Update all software to the latest stable versions

Vulnerable Applications:

  • Google Chrome (outdated) → Update to the latest version from official website
  • 7-Zip (CVE-2022-29072) → Uninstall or upgrade to patched version (v22.00+)
  • Minecraft Server (Java-based) → Limit external access, update Java and Minecraft server, apply firewall rules

System Hardening:

  • Re-enable UAC (User Account Control) to prevent privilege escalation
  • Turn off Remote Registry service if not needed
  • Remove LocalAccountTokenFilterPolicy key from registry to restore security defaults
  • Create non-admin accounts for regular usage
  • Limit Nessus credentials to least privilege where possible

✅ By applying these remediations, we significantly reduce the attack surface and bring the system closer to industry-recommended security baselines.

About

Multi-stage Nessus vulnerability scanning project in a Windows lab environment.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published