Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
76 views
CEHv10 Module 05 Vulnerability Analysis
Vulnerability Analysis
Uploaded by
Андрей Скворцов
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CEHv10 Module 05 Vulnerability Analysis For Later
Download
Save
Save CEHv10 Module 05 Vulnerability Analysis For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
76 views
CEHv10 Module 05 Vulnerability Analysis
Vulnerability Analysis
Uploaded by
Андрей Скворцов
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save CEHv10 Module 05 Vulnerability Analysis For Later
Carousel Previous
Carousel Next
Save
Save CEHv10 Module 05 Vulnerability Analysis For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 50
Search
Fullscreen
CEH Lab Manual Vulnerability Analysis Module 057 oxyour Ba weenie ID wortcoven Poole “demonstrated in ‘hie Ib are ‘available in TookcEnvio ‘Vulnorabiity ‘Analysis Lah Mend Pe Mods 08- Verity Analyt Vulnerability Scanning Vicherblty Scanning res to andi last, ports, and series renning in a netoor to assess the security pasture and sec for scary apo, Lab Scenario Eats, all porsble infonnation about dhe eget, ich as IP aldess mange and -neowork topology were gathered, (Now, at an cthical hacer, o penteste, your next step wll be to perform por scaning, ctworksaning. and winery camingon the Paditewcs cbt {nthe infcrmation gathering pace. This wll hep in idening IP hos name, pots, services, live hosts, vulnerabilities, and services running on the target network, Port scansing wil help in idenifhng the open ports snd the services running on speaiic por which involves connecting to TCP and UDP system por. Por: seaningis use to fred out the wulnerabites in he services manning on 8 port. Vuloerbity seansing determines the posibilty of nework security racks. It evaluates the orpanization’ssytems and network for wulnerailes such as missing patches, unnccesary services, weak authentication, and weik encryption. \Valoerlity scanning is accel emmponent of any penetration testing asignment. “The labs in this module sell provide you with realtime experience in network scanning and vulneralty scanning Lab Objectives “The objective of tie lab isto help students in conducting vulnerability scanning, analyzing the network vuloetilies, and 50 on. ‘You need to perform a network sea © Gheceive systems and open ports ‘= Pesform banner gabbing and OS Sngerinting deny neswork vulnesbiliies © Draw nework diagrams of vulnenble hosts Lab Environment In this ab, you aed WindowsServer 2016 system Windows Server 2012 system Windows 10 stem, = Windows system = KaliLinux system ‘a Meng sd Gane Cp HE Tac koenes peactont Sey eetMoe 05 - Verity Alle 1A Web browser wit Inert access 1 Administrative peviages to nn tools and perform scans Lab Duration “ime: A Mints Overview of Vulnerability Scanning Vulnbiliy scanning is a proces of ening sci vulerbiis of systems in 4 nerwork wo deterne if and wheres system exo be exploited: Network saning & procedure for Mdiing ae hoes on a nenwot, ether for the prj of ‘tacking them ofr neat sory semen, Scanngprocedes sch ng sweeps td port seas gue nformation abot which IP aces ap toe os that are active onthe nework, and series nang on. Lab Tasks TE paeR 7 Recornmented abs to asst in scanning networks emai * Valoerabilty Analysis using Nessus *Scaming for Neswork Vulienbiltes using the @Ft Lanouard + CGI Scanning with mnto Lab Analysis, ‘Acalgze nd doeument he senate rated to the lab exe. Give opinion on your tage’ security posture al exposure wing ifrmason collected Hugh seaming PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS “Gili he ied ang Com gy Tags Kaewed Rpwactor sy aMode 8 -Vneraity Anyi Vulnerability Analysis using Nessus ‘Neos alls to reeset a eta and determine if i as ben brake into ar ccd in some gy. Tato prove the ality oa and pec making fo inet. ieswae— Lab Scenario Differoe types of scanning on target network reveals open pons and services on ring onthe target network system, Next tp shouldbe vulnerability seaning Pi to derect possible velnerabities ofthe syrtem inthe target aetwore. So, 38 4 TERI, professional ethical hacker or peaetzation tere, you should be able to pesform ale ; Tulnerbitysanning on the target nctwork. This lb wil demonstrate how 0 (Di-wavemne _ Fessoan sims ieaiag on te bt eos vote | ob Objecti “Vis ab wil ive resl-time expeience whe using the Nessss tool to scan for network vulnerabilities, Lab Environment Tote “Yo carryout this nb, you ned femonstmatedin 4 Nessus, located a 2AGEH-ToollCEHv10 Module 05 Vulnerability ‘his nb are = ‘AnalysisiVuinerablity Assessment TeolsiMessus. You cin also Pang download the latest vetsion of Nessus from the link een) hitpzlwww-tonable.com/productsinossusisoloctyouroporating- Module 08 ‘system, Ifyou decide to download the atest version, then sereenshots aa shown in the lab might difer = Windows Sever 2016 system Windows Server 2012 system + Avweb beowser with Inemet access Administrative privileges to un the Nessus oo! ‘Git Lab Mona ae Tied Hating Gomes Cop mee “Tifiisiemres posse scr nesMod 5 -Woratty sty Lab Duration "Time: 20 Minutes Overview of Vulnerability Scanning ‘Vulnerbiliy scanning sa type of secuity assessment activity pesformad by security professionals on ther home setwork. It helps in finding posable nerwere Toran Install Nessus 2 Nemntoipats Dicesery ome pan fener Seat SSpne on ‘carta Nana Poe ‘lenses. Lab Tasks 1, _Launch Windows Server 2042 vitusl machine before beginning this ab, 2. Switeh to Windows Server 2016, nivignte to ZACEH-Tools\CEHV10 Module 08 Vulnerabilty AnalysisVuinerabilty Assessment ‘ToolsiNessue, and double-click Messue7.0.2-x64.mel, Ifthe Open File - Security Waming pop-up appears click Rum. ‘Tenable Nessus Installation Wizard appears. Follow the installation steps 0 install Nestus, Accept al installation defaults, 5, Doting installation, if Windows Security pop-up appears click Install (or sip w the nex tep. 6. Dusing installation, if awinPeap pop-up appears, cancel the instalation and ship to the next step. 7. After insulation, Nessus opens inthe default browser. ‘ting Gonacins Copy OH Ke Miagp aoa peas soc aeMote 05 -Vnratity Ay 8, ‘The Nessus window appears. Click Connect via $81 button o proceed, npntnsnne Note; Thectghout the lab, the lnga of Nessus and the page background may differ in your ab environment. 9. Your connection is not privat window appear. Click ABVANCED. reteienntame hen rms a ‘our connacton ot pte Dernier mrt stent ete RUE me Sey eee “Caliah ama Dee —~—~S~S~S*~*S*S*S*C a eC ym TEiigae tome apmscsone cy aeDoveptentitn ‘sisorcpeaes Stag te Noctuntsh nye = D senipie Speen tine Sooo pron den Siena one CENTS Maal 9H ods 08-Vuinoratty sty 10, Now, click Proceed to localhost (unsafe) link, A ne 11, "The Welcome to Nessus window appears Click the Continue button. 12, Account Setup window appears. 13, Create credentials for administrative contol ofthe earner, You can use "admin" aod "password! here, then click Continue, "eal hati and Gunns Cah iii Keane peroneal eastMot 8 Valor Ansty 14. These credentials will be used to log in to Nessus at the ime of -valnersbiliy scanning, ED wera Spaceman a. 15. The Registration window appears, enter an activation code in that. [Navigate to the Tenable web page sod register for an activation code, ‘Procead to the next step to complete the process, Dyesanig te eee aoe ov [FIGOIRE 1.2 Pag Fel Regine indo 16 Open ewe inthe women yp eink itr tomer we aot be fone “armas imagen SG Mitr Roun piesa sey PaoMoe 05-Vulnraty Anaya 17. The Nessus home pape appears. Enter the desis under Register for an ‘Activation Code, ill is the required deus and click Register. You can ‘se an alas, but you will need valid e-mail to retieve the activation code. (Consider creating an alas e-mail account ifyou do aot have one. Ceasar oer CUR: 8 ging Nem oro eto cle 18, Once it’s done, dose the window. 19, Log in w your email account, open the mai from Tenable Nessus, and copy the ection cade, Direriiearione | ters Sean ae “Gata Menat eth —~—~SCSCSC*S*~*S*S*SCSCSSTSC Ng i i KE “Sitio sedan Sch MeMe 05- Wert Aly 20, Switch to the Regiatration window, and paste dhe activation code inthe ‘Activation Code tox field, Click Contiewe, Depot ae Dreane sect nenrenlens cera ate GUE Low 21, Nessus wil start fetching the plugins and will install chem. It will tke time to download plugins and perform the initialization. ese LGU 11 Nene onve ign “Gittaktond eae ——~SCSC*~*~*~*S*SCSSCS ge CO AN Mipcom tpeactons Seay eeeMei 05-Vulnraty Anaya 22, Nessus begins to initialize i takes some time to initialize ED osstane ay, Sanam ‘CURE New hg 23, On complain of ntalization, the Nessus Lop In page appears. ‘Ga Lab Mem Ti king an Gomme Carat bE “Bitgiritmne pesnsons Sey eke
You might also like
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
From Everand
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
Mark Manson
4/5 (6134)
Principles: Life and Work
From Everand
Principles: Life and Work
Ray Dalio
4/5 (627)
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Brene Brown
4/5 (1148)
Never Split the Difference: Negotiating As If Your Life Depended On It
From Everand
Never Split the Difference: Negotiating As If Your Life Depended On It
Chris Voss
4.5/5 (935)
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Jeannette Walls
4/5 (8215)
Grit: The Power of Passion and Perseverance
From Everand
Grit: The Power of Passion and Perseverance
Angela Duckworth
4/5 (631)
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
Jesmyn Ward
4/5 (1253)
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Stephen Chbosky
4/5 (8365)
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Phil Knight
4.5/5 (860)
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Carmen Maria Machado
4/5 (877)
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
From Everand
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
Ben Horowitz
4.5/5 (361)
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
From Everand
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
Margot Lee Shetterly
4/5 (954)
Steve Jobs
From Everand
Steve Jobs
Walter Isaacson
4/5 (2923)
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
From Everand
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
Ashlee Vance
4.5/5 (484)
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
Siddhartha Mukherjee
4.5/5 (277)
A Man Called Ove: A Novel
From Everand
A Man Called Ove: A Novel
Fredrik Backman
4.5/5 (4973)
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Frank McCourt
4.5/5 (444)
Brooklyn: A Novel
From Everand
Brooklyn: A Novel
Colm Toibin
3.5/5 (2061)
The Art of Racing in the Rain: A Novel
From Everand
The Art of Racing in the Rain: A Novel
Garth Stein
4/5 (4281)
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
Sarah M. Broom
4/5 (100)
The Little Book of Hygge: Danish Secrets to Happy Living
From Everand
The Little Book of Hygge: Danish Secrets to Happy Living
Meik Wiking
3.5/5 (447)
Yes Please
From Everand
Yes Please
Amy Poehler
4/5 (1988)
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
From Everand
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
Gilbert King
4.5/5 (278)
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Thomas L. Friedman
3.5/5 (2283)
Bad Feminist: Essays
From Everand
Bad Feminist: Essays
Roxane Gay
4/5 (1068)
The Outsider: A Novel
From Everand
The Outsider: A Novel
Stephen King
4/5 (1993)
The Woman in Cabin 10
From Everand
The Woman in Cabin 10
Ruth Ware
3.5/5 (2641)
A Tree Grows in Brooklyn
From Everand
A Tree Grows in Brooklyn
Betty Smith
4.5/5 (1936)
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
From Everand
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
Viet Thanh Nguyen
4.5/5 (125)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Dave Eggers
3.5/5 (692)
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Doris Kearns Goodwin
4.5/5 (1912)
Wolf Hall: A Novel
From Everand
Wolf Hall: A Novel
Hilary Mantel
4/5 (4074)
On Fire: The (Burning) Case for a Green New Deal
From Everand
On Fire: The (Burning) Case for a Green New Deal
Naomi Klein
4/5 (75)
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
Bob Woodward
3.5/5 (830)
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
Jennifer Egan
3.5/5 (901)
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Jay Sekulow
3.5/5 (143)
John Adams
From Everand
John Adams
David McCullough
4.5/5 (2544)
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
M L Stedman
4.5/5 (790)
CEHv10 Module 14 Hacking Web Applications
PDF
No ratings yet
CEHv10 Module 14 Hacking Web Applications
105 pages
CEHv10 Module 12 Evading IDS, Firewalls, and Honeypots
PDF
No ratings yet
CEHv10 Module 12 Evading IDS, Firewalls, and Honeypots
92 pages
CEHv10 Module 08 Sniffing
PDF
No ratings yet
CEHv10 Module 08 Sniffing
102 pages
CEHv10 Module 03 Scanning Networks
PDF
No ratings yet
CEHv10 Module 03 Scanning Networks
146 pages
CEHv10 Module 16 Hacking Wireless Networks
PDF
No ratings yet
CEHv10 Module 16 Hacking Wireless Networks
32 pages
CEHv10 Module 19 Cloud Computing
PDF
No ratings yet
CEHv10 Module 19 Cloud Computing
75 pages
CEHv10 Module 10 Denial-Of-Service
PDF
No ratings yet
CEHv10 Module 10 Denial-Of-Service
37 pages
CEHv10 Module 15 SQL Injection
PDF
No ratings yet
CEHv10 Module 15 SQL Injection
48 pages
CEHv10 Module 09 Social Engineering
PDF
No ratings yet
CEHv10 Module 09 Social Engineering
39 pages
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
George Packer
4/5 (45)
Little Women
From Everand
Little Women
Louisa May Alcott
4/5 (105)
The Constant Gardener: A Novel
From Everand
The Constant Gardener: A Novel
John le Carré
3.5/5 (109)