Git Product home page Git Product logo

vulnerabilityscanlab's Introduction

Advanced OS Vulnerability Scanning

Description

Project consists of two virtual machines in VMware. One is Kali Linux where we will run the Nessus vulnerability scanner and Metasploitable2 VM that we will use to scan for vulnerabilities. We will also show how to run authenticated and unauthenticated vulnerability scanning using Nessus.

Languages and Utilities Used

  • Bash
  • Nmap
  • Nessus
  • VMware

Environments Used

  • Kali Linux VM
  • Metasploitable2 VM

Program walk-through:

Start Nessus Service in Kali Terminal
OS Vulnerability Scanning

Open Firefox then type https://localhost:8834
Login and you will the Nessus dashboard OS Vulnerability Scanning

After Login, Click New Scan
OS Vulnerability Scanning

Then click on Host Discovery.
Note that host discovery will run a vulnerability scan after detecting if host is up on the network
OS Vulnerability Scanning

Name the scan as Metasploitable VM then type the IP address of Metasploitable VM in the targets field.
Finally, Click Save
OS Vulnerability Scanning

This will go back to My Scans folder. Run the scan and wait for it to complete
OS Vulnerability Scanning

Upon completion, click on the name of the scan that we have set earlier
OS Vulnerability Scanning

On the Vulnerability tab, we can only see 2 vulnerabilities when we ran an unauthenticated scan
OS Vulnerability Scanning

Next. We will run an authenticated scan. Click on new scan on the top right corner
on the dashboard then click on Basic Network Scan
OS Vulnerability Scanning

Provide a name for scan. We simply name it Authenticated scan then type the IP address of Metasploitable VM
Then click on credentials tab
OS Vulnerability Scanning

On the left panel, Click SSH because metasploitable is a Linux virtual machine. (Choose Windows if we are running an authenticated scan on Windows OS Target
then change the Authentication method to password then type the password to login to Metasploitable VM.
Scroll down then click on Save. Back to scans folder click on Run.
OS Vulnerability Scanning

After finishing the scan. Click on Vulnerabilities tab. We will see a list of vulnerabilities categorize into critical, high, medium, low, and informational
OS Vulnerability Scanning

Notice that we have more vulnerabilities identified and that is because we ran an authenticated scan and be able to detect missing patches and misconfiguration
OS Vulnerability Scanning

vulnerabilityscanlab's People

Contributors

gerry-gonzales avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.