Vulnerability Test on my VirtualBox using Nessus
This project demonstrates a vulnerability assessment conducted in a home lab environment using Tenable Nessus. The goal was to identify, analyze, and document vulnerabilities on a target virtual machine, simulating real-world vulnerability management and blue team operations.
- Tenable Nessus Essentials – for vulnerability scanning
- VirtualBox – to host virtual machines
- Windows 10 VM – as the vulnerable target
- Kali Linux – lab management and optional tools
- Set up virtual lab environment (VirtualBox + VMs)
- Installed and configured Nessus
- Ran a basic network scan on the Windows VM
- Analyzed the scan results using CVSS scores and plugin data
- Documented findings and outlined possible remediations
- How to configure and run a Nessus scan
- Understanding CVEs, CVSS scores, and vulnerability classifications
- Practical experience in scanning and reporting like a security analyst
- How vulnerability scanners fit into a broader security operations workflow
- Scan more complex environments with multiple hosts
- Integrate scan results with SIEM tools for alerting and correlation
- Explore automated patching or remediation options
- Adding SIEM to the vulnerability test
This project is part of my cybersecurity portfolio. I’m currently exploring blue team operations, cloud security, and SIEM solutions. Feedback or collaboration is welcome!
