ABSTRACT

To understand the network vulnerability attack, one needs to understand that the attacker doesn’t attack in isolation, rather than that, they attack in a combination. So, this chapter presents the study about the history of Nessus, what is it and how does it work with plugins. It also studies the features of Nessus, which makes Nessus a highly recommended network vulnerability scanning tool in the network forensic. This chapter presents how Nessus is to be downloaded and how Nessus works in steps in which the user has taken a local IP address and remote IP address to perform the vulnerability scan. Nessus is also helpful in digital twinning because of its feature of network vulnerability risk assessment and it is also reducing the assessment time which may cause an increase in updating the security protocols in digital twin evaluation.