Date : 06 Mar, 2025


[Download Metasploitable](https:// sourceforge.net/projects/metasploitable/)

attachments/Pasted image 20250406191028.png|800

  1. extract all → then open the vmx file in vmware

  2. username : msfadmin,password :msfadmin

  3. ifconfig

    • this will get you the ip of metasploit, which is the target ip
  4. Create a new scan in nessus
    attachments/Pasted image 20250406191250.png|900

  5. Advanced scan
    attachments/Pasted image 20250406191313.png|900

  6. Fill the following details
    attachments/Pasted image 20250406191416.png|900

  7. Discoveryhost discovery → do the following edits
    attachments/Pasted image 20250406191448.png|900

  8. Go to port scanning
    attachments/Pasted image 20250406191512.png|900

  9. turn on the UDP
    attachments/Pasted image 20250406191559.png|900

  10. in port scanning : set port scan range
    attachments/Pasted image 20250406191635.png|900

  11. Web applications → do the following edits
    attachments/Pasted image 20250406191659.png|900
    attachments/Pasted image 20250406191736.png|900
    attachments/Pasted image 20250406191742.png|900

  12. Go to report
    ! 900
    attachments/Pasted image 20250406191820.png|900

  13. go to advanced → enable the safe checks

Important

if its enabled , jo server ko crash karne wale plugins hai woh server ko crash nehi karega.

attachments/Pasted image 20250406192107.png|900
! 900
attachments/Pasted image 20250406192135.png|900

  1. go to Credentialsshh
    attachments/Pasted image 20250406192214.png|900
    attachments/Pasted image 20250406192233.png|900

  2. go to plugins and disable the following
    attachments/Pasted image 20250406192301.png|900
    attachments/Pasted image 20250406192330.png|900
    ! 900
    attachments/Pasted image 20250406192344.png|900

  3. Save


Burp SuiteWeb App Hacker Tool

Note

Used by: Web security testers (manual testing)


NessusNetwork Scanner

Note

Used by: IT teams and companies (automatic scanning)