0
0
Cybersecurityknowledge~10 mins

Vulnerability scanning tools (Nessus, OpenVAS) in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Vulnerability scanning tools (Nessus, OpenVAS)
Start Scan Setup
Select Target Systems
Choose Scan Type
Run Vulnerability Scan
Scan Engine Analyzes Targets
Generate Vulnerability Report
Review & Prioritize Fixes
End
The flow shows how a vulnerability scanning tool like Nessus or OpenVAS runs a scan: setup, target selection, scanning, analysis, reporting, and review.
Execution Sample
Cybersecurity
1. Open tool (Nessus/OpenVAS)
2. Add target IP or hostname
3. Select scan policy (e.g., full scan)
4. Start scan
5. Wait for scan to complete
6. View report
This sequence shows the basic steps to perform a vulnerability scan using Nessus or OpenVAS.
Analysis Table
StepActionTool BehaviorOutput/Result
1Open toolTool interface loadsReady to configure scan
2Add target IPTarget added to scan listTarget queued for scanning
3Select scan policyScan rules loadedScan configured with selected policy
4Start scanTool begins probing targetScan in progress
5Scan engine analyzes targetChecks for known vulnerabilitiesFinds vulnerabilities or none
6Generate reportCompiles findingsReport with vulnerabilities and severity
7Review reportUser reads reportPlan fixes based on priority
8EndScan session endsScan results saved
💡 Scan ends after report generation and review; no further scanning unless restarted.
State Tracker
VariableStartAfter Step 2After Step 4After Step 6Final
Target ListEmptyContains target IPContains target IPContains target IPContains target IP
Scan StatusNot startedNot startedIn progressCompletedCompleted
ReportNoneNoneNoneGeneratedReviewed
Key Insights - 3 Insights
Why does the scan take time after starting?
Because the tool probes the target system for many known vulnerabilities, which requires network communication and analysis (see execution_table step 5).
What does the scan policy affect?
The scan policy determines which vulnerabilities and tests the tool runs, affecting scan depth and duration (see execution_table step 3).
Why is reviewing the report important?
Because it helps prioritize which vulnerabilities to fix first based on severity and risk (see execution_table step 7).
Visual Quiz - 3 Questions
Test your understanding
At which step does the tool start actively checking the target for vulnerabilities?
AStep 4
BStep 2
CStep 6
DStep 7
💡 Hint
Look at execution_table row for Step 4 where scan begins.
What is the status of the scan after Step 3?
ACompleted
BIn progress
CNot started
DReport generated
💡 Hint
Check variable_tracker for Scan Status after Step 3 (between Step 2 and Step 4).
If you add multiple target IPs at Step 2, how does the Target List variable change?
AIt remains empty
BIt contains all added IPs
CIt contains only the first IP
DIt resets after each addition
💡 Hint
Refer to variable_tracker for Target List after Step 2.
Concept Snapshot
Vulnerability scanning tools like Nessus and OpenVAS:
- Scan target systems for known security weaknesses
- Require setup: target selection and scan policy
- Perform network probes and checks
- Generate detailed reports with severity levels
- Help prioritize security fixes
- Are essential for proactive cybersecurity
Full Transcript
Vulnerability scanning tools such as Nessus and OpenVAS help find security weaknesses in computer systems. The process starts by opening the tool and adding the target system's IP address or hostname. Next, the user selects a scan policy that defines what tests will run. When the scan starts, the tool probes the target to detect known vulnerabilities. After scanning, it generates a report listing found issues with severity ratings. The user then reviews this report to decide which vulnerabilities to fix first. This step-by-step process ensures systems are checked regularly to improve security.