Nessus Add-on v2.0 Documentation

Scan for the latest vulnerabilities using Nessus and download detailed vulnerability reports in HTML and CSV format with Nessus Add-on for Sn1per Professional!


  • Integrate with Nessus to scan for the latest CVE’s and vulnerabilities
  • Download detailed vulnerability reports in HTML and CSV format.
  • Import all vulnerabilities into Sn1per Professional


This add-on requires a Sn1per Professional v9.0 license along with the following add-ons and components:

  • Command Execution Add-on v2.0
  • Nessus Add-on v2.0
  • Nessus v10.x

This assumes that you already have a working Nessus installation running the latest version (10.x). If not, you can obtain a free Nessus license from


After Nessus is installed, follow the steps below to install the Nessus add-on:

  1. Run /etc/init.d/nessusd start to start the Nessus service
  2. Open a new browser window and go to: and login to confirm your Nessus installation
  3. Extract contents of nessus-add-on-v2.tar.gz to /tmp/
cd tmp
tar -zxvf nessus-add-on-v2.tar.gz
  1. Run script as ‘root’:
sudo bash


  1. Add your Nessus host/IP, username and password to your /root/.sniper.conf file or create a separate Sn1per configuration template under /usr/share/sniper/conf/ (see here for details on creating dynamic configuration templates) to enable Nessus scanning in Sn1per:
NESSUS_POLICY_ID="c3cbcd46-329f-a9ed-1077-554f8c2af33d0d44f09d736969bf" #DEFAULT POLICY

Selecting A Scan Policy

  1. To select a different scan policy to use for the scan, you will need to use web developer tools while accessing the Nessus web UI. To do this, click the “Policies” menu and click on the policy you want to use for Sn1per scans and click “Save”. Under the “Network” tab in web developer tools, you will see a “PUT” request with the UUID of the policy on the request body. You will need to update your Sn1per conf NESSUS_POLICY_ID setting with this value prior to running the scan.

Running scans

7. Run a test vuln scan to confirm your installation:

sniper -t -m vulnscan -w

For multi-host scans, you can also use sniper -f targets.txt -m massvulnscan -w targets command.

NOTE: This can also be done using the Command Execution Add-on from the web UI.


After the scan(s) complete, results will be shown in the workspace report view under the “Vulnerabilities” section and from the host report as well as the “Vulnerability Report Viewer“.


Back to Main Documentation