We will now create a more in-depth scan where we will modify some of the parameters of a scan to include other, more targeted testing using Nessus. What we would hope to see is better and more complete results of the target host in question. This will give you a base level of understanding to customize your scans.
Advanced vulnerability scanning with Nessus
Getting ready
Let's ensure the following prerequisites:
- Kali Linux is running and you are logged in as root
- Start the Metasploitable virtual machine
- Ensure you have completed the setup of Nessus, Nessus is started, and you are at the main screen after logging in