Using the Metasploit DB for Nessus scan

All of the targets that are stored in the Metasploit DB can be passed on to Nessus using the nessus_db_scan <policy ID> <scan name> <scan description> command. In our case, we have the target 192.168.2.1 IP stored in our Metasploit DB; upon executing this command, Nessus will start the scan (NOT only creating the task, but launching it as well) on the target IP, which is stored in the Metasploit DB:

Follow these steps:

  1. Let's confirm the preceding execution from the Nessus web interface:
  1. As we can see ...

Get Hands-On Web Penetration Testing with Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.