In this chapter, we started by introducing the Nessus bridge. We then learned about configuring the bridge. Next, we saw how to initiate Nessus scans from the Metasploit console, and finally, we learned how to import scan results into the Metasploit database for further use.
In the next chapter, we'll be learning how to perform a penetration test on a Content Management Systems (CMS), starting with the popular system, WordPress.