0% found this document useful (0 votes)
76 views

CEHv10 Module 05 Vulnerability Analysis

Vulnerability Analysis
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
76 views

CEHv10 Module 05 Vulnerability Analysis

Vulnerability Analysis
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 50
CEH Lab Manual Vulnerability Analysis Module 05 7 oxyour Ba weenie ID wortcoven Poole “demonstrated in ‘hie Ib are ‘available in TookcEnvio ‘Vulnorabiity ‘Analysis Lah Mend Pe Mods 08- Verity Analyt Vulnerability Scanning Vicherblty Scanning res to andi last, ports, and series renning in a netoor to assess the security pasture and sec for scary apo, Lab Scenario Eats, all porsble infonnation about dhe eget, ich as IP aldess mange and -neowork topology were gathered, (Now, at an cthical hacer, o penteste, your next step wll be to perform por scaning, ctworksaning. and winery camingon the Paditewcs cbt {nthe infcrmation gathering pace. This wll hep in idening IP hos name, pots, services, live hosts, vulnerabilities, and services running on the target network, Port scansing wil help in idenifhng the open ports snd the services running on speaiic por which involves connecting to TCP and UDP system por. Por: seaningis use to fred out the wulnerabites in he services manning on 8 port. Vuloerbity seansing determines the posibilty of nework security racks. It evaluates the orpanization’ssytems and network for wulnerailes such as missing patches, unnccesary services, weak authentication, and weik encryption. \Valoerlity scanning is accel emmponent of any penetration testing asignment. “The labs in this module sell provide you with realtime experience in network scanning and vulneralty scanning Lab Objectives “The objective of tie lab isto help students in conducting vulnerability scanning, analyzing the network vuloetilies, and 50 on. ‘You need to perform a network sea © Gheceive systems and open ports ‘= Pesform banner gabbing and OS Sngerinting deny neswork vulnesbiliies © Draw nework diagrams of vulnenble hosts Lab Environment In this ab, you aed WindowsServer 2016 system Windows Server 2012 system Windows 10 stem, = Windows system = KaliLinux system ‘a Meng sd Gane Cp HE Tac koenes peactont Sey eet Moe 05 - Verity Alle 1A Web browser wit Inert access 1 Administrative peviages to nn tools and perform scans Lab Duration “ime: A Mints Overview of Vulnerability Scanning Vulnbiliy scanning is a proces of ening sci vulerbiis of systems in 4 nerwork wo deterne if and wheres system exo be exploited: Network saning & procedure for Mdiing ae hoes on a nenwot, ether for the prj of ‘tacking them ofr neat sory semen, Scanngprocedes sch ng sweeps td port seas gue nformation abot which IP aces ap toe os that are active onthe nework, and series nang on. Lab Tasks TE paeR 7 Recornmented abs to asst in scanning networks emai * Valoerabilty Analysis using Nessus *Scaming for Neswork Vulienbiltes using the @Ft Lanouard + CGI Scanning with mnto Lab Analysis, ‘Acalgze nd doeument he senate rated to the lab exe. Give opinion on your tage’ security posture al exposure wing ifrmason collected Hugh seaming PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS “Gili he ied ang Com gy Tags Kaewed Rpwactor sy a Mode 8 -Vneraity Anyi Vulnerability Analysis using Nessus ‘Neos alls to reeset a eta and determine if i as ben brake into ar ccd in some gy. Tato prove the ality oa and pec making fo inet. ieswae— Lab Scenario Differoe types of scanning on target network reveals open pons and services on ring onthe target network system, Next tp shouldbe vulnerability seaning Pi to derect possible velnerabities ofthe syrtem inthe target aetwore. So, 38 4 TERI, professional ethical hacker or peaetzation tere, you should be able to pesform ale ; Tulnerbitysanning on the target nctwork. This lb wil demonstrate how 0 (Di-wavemne _ Fessoan sims ieaiag on te bt eos vote | ob Objecti “Vis ab wil ive resl-time expeience whe using the Nessss tool to scan for network vulnerabilities, Lab Environment Tote “Yo carryout this nb, you ned femonstmatedin 4 Nessus, located a 2AGEH-ToollCEHv10 Module 05 Vulnerability ‘his nb are = ‘AnalysisiVuinerablity Assessment TeolsiMessus. You cin also Pang download the latest vetsion of Nessus from the link een) hitpzlwww-tonable.com/productsinossusisoloctyouroporating- Module 08 ‘system, Ifyou decide to download the atest version, then sereenshots aa shown in the lab might difer = Windows Sever 2016 system Windows Server 2012 system + Avweb beowser with Inemet access Administrative privileges to un the Nessus oo! ‘Git Lab Mona ae Tied Hating Gomes Cop mee “Tifiisiemres posse scr nes Mod 5 -Woratty sty Lab Duration "Time: 20 Minutes Overview of Vulnerability Scanning ‘Vulnerbiliy scanning sa type of secuity assessment activity pesformad by security professionals on ther home setwork. It helps in finding posable nerwere Toran Install Nessus 2 Nemntoipats Dicesery ome pan fener Seat SSpne on ‘carta Nana Poe ‘lenses. Lab Tasks 1, _Launch Windows Server 2042 vitusl machine before beginning this ab, 2. Switeh to Windows Server 2016, nivignte to ZACEH-Tools\CEHV10 Module 08 Vulnerabilty AnalysisVuinerabilty Assessment ‘ToolsiNessue, and double-click Messue7.0.2-x64.mel, Ifthe Open File - Security Waming pop-up appears click Rum. ‘Tenable Nessus Installation Wizard appears. Follow the installation steps 0 install Nestus, Accept al installation defaults, 5, Doting installation, if Windows Security pop-up appears click Install (or sip w the nex tep. 6. Dusing installation, if awinPeap pop-up appears, cancel the instalation and ship to the next step. 7. After insulation, Nessus opens inthe default browser. ‘ting Gonacins Copy OH Ke Miagp aoa peas soc ae Mote 05 -Vnratity Ay 8, ‘The Nessus window appears. Click Connect via $81 button o proceed, npntnsnne Note; Thectghout the lab, the lnga of Nessus and the page background may differ in your ab environment. 9. Your connection is not privat window appear. Click ABVANCED. reteienntame hen rms a ‘our connacton ot pte Dernier mrt stent ete RUE me Sey eee “Caliah ama Dee —~—~S~S~S*~*S*S*S*C a eC ym TEiigae tome apmscsone cy ae Doveptentitn ‘sisorcpeaes Stag te Noctuntsh nye = D senipie Speen tine Sooo pron den Siena one CENTS Maal 9H ods 08-Vuinoratty sty 10, Now, click Proceed to localhost (unsafe) link, A ne 11, "The Welcome to Nessus window appears Click the Continue button. 12, Account Setup window appears. 13, Create credentials for administrative contol ofthe earner, You can use "admin" aod "password! here, then click Continue, "eal hati and Gunns Cah iii Keane peroneal east Mot 8 Valor Ansty 14. These credentials will be used to log in to Nessus at the ime of -valnersbiliy scanning, ED wera Spaceman a. 15. The Registration window appears, enter an activation code in that. [Navigate to the Tenable web page sod register for an activation code, ‘Procead to the next step to complete the process, Dyesanig te eee aoe ov [FIGOIRE 1.2 Pag Fel Regine indo 16 Open ewe inthe women yp eink itr tomer we aot be fone “armas imagen SG Mitr Roun piesa sey Pao Moe 05-Vulnraty Anaya 17. The Nessus home pape appears. Enter the desis under Register for an ‘Activation Code, ill is the required deus and click Register. You can ‘se an alas, but you will need valid e-mail to retieve the activation code. (Consider creating an alas e-mail account ifyou do aot have one. Ceasar oer CUR: 8 ging Nem oro eto cle 18, Once it’s done, dose the window. 19, Log in w your email account, open the mai from Tenable Nessus, and copy the ection cade, Direriiearione | ters Sean ae “Gata Menat eth —~—~SCSCSC*S*~*S*S*SCSCSSTSC Ng i i KE “Sitio sedan Sch Me Me 05- Wert Aly 20, Switch to the Regiatration window, and paste dhe activation code inthe ‘Activation Code tox field, Click Contiewe, Depot ae Dreane sect nenrenlens cera ate GUE Low 21, Nessus wil start fetching the plugins and will install chem. It will tke time to download plugins and perform the initialization. ese LGU 11 Nene onve ign “Gittaktond eae ——~SCSC*~*~*~*S*SCSSCS ge CO AN Mipcom tpeactons Seay eee Mei 05-Vulnraty Anaya 22, Nessus begins to initialize i takes some time to initialize ED osstane ay, Sanam ‘CURE New hg 23, On complain of ntalization, the Nessus Lop In page appears. ‘Ga Lab Mem Ti king an Gomme Carat bE “Bitgiritmne pesnsons Sey eke

You might also like