Put simply, Nessus identifies potential vulnerabilities, whereas Metasploit exploits the vulnerability. Metasploit is basically a list of exploits you can use against a target, Nessus tells you which one you should pick a bit like asking a shop assistant what would work best to hack the said computer, the shop assistant (Nessus), will say: "Yes of course sir, I think you will want this." as he points to an item on the shelf (Metasploit).
GFI surpasses Nessus when targeting Windows hosts
Nessus gives you risk levels to each IP address with a detailed report.
Metasploit works on Linux and Windows only. You can download it at www.metasploit.com
In Greek mythology, Nessus was a centaur whom Heracles killed. Nessus gave Heracles' wife a tunic poisoned with Nessus' own blood, and Heracles put it on and died. The term "shirt of Nessus" refers to something that appears to be a victory but ends up destroying the apparent victor..
A security specialist would use metasploit to determine that a change to their software was working correctly by developing a test that Metasploit could use repeatedly to test the solution.
xtahu. ak tnye kamu , kamu tnye ak balik
A Metasploit vuln scan is a security assessment process that utilizes the Metasploit Framework to identify vulnerabilities in a system, application, or network. It helps cybersecurity professionals detect security flaws that hackers could exploit, such as outdated software, misconfigurations, or weak credentials. Conducting regular vulnerability scans with Metasploit enables organizations to strengthen their security posture, mitigate risks, and proactively prevent cyberattacks before they happen.
The person that killed was Nessus, the centaur.:)
the cause of misfortunune
http://en.wikipedia.org/wiki/Shirt_of_Nessus
Several tools can be used for security auditing purposes, including: Nmap – For network scanning and identifying open ports and services. Nessus – A vulnerability scanner used to find security issues in systems. Wireshark – Captures and analyzes network traffic for suspicious activity. Metasploit – Used for penetration testing and verifying vulnerabilities. OSSEC – An open-source host-based intrusion detection system. Qualys – Cloud-based tool for vulnerability management and compliance scanning. Each tool helps assess different aspects of an organization’s security posture.
Security scanner for Oracle and various flavors of Unix. Performs over 900 remote security checks, and suggests solutions for security problems.www.nessus.org/Nessus was a centaur who was killed by Hercules and in turn deceived Hercule's wife, Deianeira, into putting the blood of Nessus on his shirt which in turn killed Hercules eventually. Son of Ixion and Nephele.