Lab 4 Vulnerability Analysis
Lab 4 Vulnerability Analysis
Lab Scenario
As a professional ethical hacker or pen tester, your first step is to search for vulnerabilities in the
target system or network using vulnerability scoring systems and databases. Vulnerability
research provides awareness of advanced techniques to identify flaws or loopholes in the
software that could be exploited. Using this information, you can use various tricks and
techniques to launch attacks on the target system.
Lab Objectives
Vulnerability databases collect and maintain information about various vulnerabilities present in
the information systems.
The following are some of the vulnerability scoring systems and databases:
Common Weakness Enumeration (CWE) is a category system for software vulnerabilities and
weaknesses. It has numerous categories of weaknesses that means that CWE can be effectively
employed by the community as a baseline for weakness identification, mitigation, and prevention
efforts. Further, CWE has an advanced search technique with which you can search and view the
weaknesses based on research concepts, development concepts, and architectural concepts.
Here, we will use CWE to view the latest underlying system vulnerabilities.
3. Launch any browser, here, we are using Mozilla Firefox. In the address bar of
the browser place your mouse cursor and click https://cwe.mitre.org/ and
press Enter
o If the Default Browser pop-up window appears, uncheck the Always
perform this check when starting Firefox checkbox and click the Not
now button.
Here, we are searching for the vulnerabilities of the running services that were found
in the target systems in previous module labs (Module 04 Enumeration).
5. The search results appear, displaying the underlying vulnerabilities in the target
service (here, SMB). You can click any link to view detailed information on the
vulnerability.
9. Now, navigate back to the CWE website, scroll down, and click the CWE List link
present below the searched results.
10. A new webpage appears, displaying CWE List Version. Scroll down, and under
the External Mappings section, click CWE Top 25 (2019).
This information can be used to exploit the vulnerabilities in the software and further
launch attacks.
14. Close all open windows and document all the acquired information.
Common Vulnerabilities and Exposures (CVE) is a publicly available and free-to-use list or
dictionary of standardized identifiers for common software vulnerabilities and exposures. It is
used to discuss or share information about a unique software or firmware vulnerability, provides
a baseline for tool evaluation, and enables data exchange for cybersecurity automation.
Here, we will use CVE to view the latest underlying system and software vulnerabilities.
3. You can copy the name of any vulnerability under the Newest CVE
Entries section and search on CVE to view detailed information on it. (here, we are
selecting the vulnerability CVE-2020-13910)
4. Now, click on the Search CVE List tab. Under Search CVE List section, type the
vulnerability name (here, CVE-2020-4051) in the search bar, and click Submit.
5. Search Results page appears, displaying the information regarding the
searched vulnerability. You can click the vulnerability link to view further detailed
information regarding the vulnerability.
6. Similarly, in the Search CVE List section, you can search for a service-related
vulnerability by typing the service name (here, SMB) and click Submit.
You can search for the vulnerabilities of the running services that were found in the
target systems in previous module labs (Module 04 Enumeration).
12. Close all open windows and document all the acquired information.
The National Vulnerability Database (NVD) is the U.S. government repository of standards-based
vulnerability management data represented using the Security Content Automation Protocol
(SCAP). These data enable the automation of vulnerability management, security measurement,
and compliance. The NVD includes databases of security checklist references, security-related
software flaws, misconfigurations, product names, and impact metrics.
Here, we will use the NVD to view the latest underlying system and software vulnerabilities.
1. In Windows 10 machine, launch any browser (here, Mozilla Firefox). In the
address bar of the browser place your mouse cursor and
click https://nvd.nist.gov/ and press Enter
None 0.0
Low 0.1-3.9
Medium 4.0-6.9
High 7.0-8.9
Critical 9.0-10.0
CVSS v2.0
Ratings
Severity Base Score Range
Low 0.0-3.9
Medium 4.0-6.9
High 7.0-10
more...
o Temporal Score: Represents the qualities of the vulnerability that change
over time, and the Environmental score represents the qualities of the
vulnerability that are specific to the affected user's environment.
o Overall Score: Sum total of both the scores (CVSS Base Score, CVSS
Temporal Score).
7. Scroll down to view more detailed information on different score metrics such
as Base Score Metrics, Temporal Score Metrics, and Environmental Score
Metrics.
You can search for the vulnerabilities of the running services that were found in the
target systems in previous module labs (Module 04 Enumeration).
10. The Search Results page appears, displaying detailed information on the
underlying vulnerabilities in the target service.
11. You can further view detailed information on each vulnerability by clicking on
the Vuln ID link.
12. Likewise, you can search for other target services for the underlying vulnerability
in the Search Vulnerability Database section.
14. Close all open windows and document all the acquired information.
Lab Scenario
The information gathered in the previous labs might not be sufficient to reveal potential
vulnerabilities of the target: there could be more information available that may help in finding
loopholes. As an ethical hacker, you should look for as much information as possible using all
available tools. This lab will demonstrate other information that you can extract from the target
using various vulnerability assessment tools.
Lab Objectives
Vulnerability assessment tools are used to secure and protect the organization’s system or
network: security analysts can use these tools to identify weaknesses present in the organization’s
security posture and remediate the identified vulnerabilities before an attacker exploits them.
Network vulnerability scanners analyze and identify vulnerabilities in the target network or
network resources using vulnerability assessment and network auditing. These tools also assist in
overcoming weaknesses in the network by suggesting various remediation techniques.
OpenVAS is a framework of several services and tools offering a comprehensive and powerful
vulnerability scanning and vulnerability management solution. Its capabilities include
unauthenticated testing, authenticated testing, various high level and low-level Internet and
industrial protocols, performance tuning for large-scale scans, and a powerful internal
programming language to implement any vulnerability test. The actual security scanner is
accompanied with a regularly updated feed of Network Vulnerability Tests (NVTs)—over 50,000
in total.
In this task, we will use the Parrot Security (10.10.10.13) machine as a host machine and
the Windows Server 2016 (10.10.10.16) machine as a target machine.
If you are logged out of the session then login again using
credentials admin/password.
14. Report: Information appears, click Results tab to view the discovered
vulnerabilities along with their severity and port numbers on which they are running.
15. Click on any vulnerability under the Vulnerability column (here, Apache HTTP
Server 2.4.20 - 2.4.39 Multiple Vulnerabilities (Windows) to view its detailed
information.
18. Next, go through the findings, including all high or critical vulnerabilities.
Manually use your skills to verify the vulnerability. The challenge with vulnerability
scanners is that they are quite limited; they work well for an internal or white box
test only if the credentials are known. We will explore that now: return to your
OpenVAS tool, and set up for the same scan again; but this time, turn your firewall
ON in the Windows Server 2016 machine.
19. Now, we will enable Windows Firewall in the target system and scan it for
vulnerabilities.
By turning the Firewall ON, you are making it more difficult for the scanning tool to
scan for vulnerabilities in the target system.
22. click on Parrot Security to switch to Parrot Security machine and
perform Steps# 9-11 to create another task for scanning the target system.
23. A newly created task appears under the Tasks section and starts scanning the
target system for vulnerabilities.
28. Close all open windows and document all the acquired information.
Here, we will use Nessus to perform vulnerability scanning on the target system.
2. Launch any browser, (here, Microsoft Edge). In the address bar of the browser
place your mouse cursor and click https://localhost:8834/ and press Enter
In the Let Microsoft Edge save and fill your password for this site next
time? pop-up, click Never.
6. The Nessus Essentials dashboard appears;
click Policies under RESOURCES section from the pane on the left.
16. Click the Plugins tab and do not alter any of the options in this window. Click
the Save button.
17. A Policy saved successfully notification pop-up appears, and the policy is
added in the Policies window, as shown in the screenshot.
18. Now, click Scans from the menu bar to open My Scans window; click Create a
new scan.
23. After the completion of the scan: click Local Network to view the detailed
results.
26. Click these vulnerabilities to view detailed reports about each. For instance, in
this lab, we are selecting the first vulnerability in the list, that is, SNMP (Multiple
Issues).
27. The Local Network / SNMP (Multiple Issues) window appears, displaying
multiple issues in SNMP service. Click on any issue (here, SNMP Agent Default) to
view its detailed information.
28. The report regarding selected vulnerability SNMP Agent Default Community
Name (public) appears with detailed information such as plugin details, risk
information, vulnerability information, reference information and the solution, and
output, as shown in the screenshot.
29. On completing the vulnerability analysis, click Scans, and then click the recently
performed scan (here, Local Network).
30. In the Local Network window, click the Report tab from the top-right corner,
and choose a file format (here, HTML) from the drop-down list. By downloading a
report, you can access it anytime, instead of logging in to Nessus again and again.
31. The Generate HTML Report pop-up appears: leave the Report type option on
default (Executive Summary). Click Generate Report to download the report.
32. Once the download is finished, a pop-up appears at the bottom of the browser;
click Open.
33. If the How do you want to open this file? pop-up appears, choose any
browser (here, Firefox) to view the downloaded HTML file.
34. The Nessus scan report appears in the Firefox web browser, as shown in the
screenshot.
35. You can click the Expand All option to view the detailed scan report.
36. A list of discovered vulnerabilities appears. You can further click on plugins
(here, 130276) to view more detailed information on the vulnerability
38. In this way, you can select a vulnerability of your choice to view the complete
details.
39. Once the vulnerability analysis is done, switch back to Microsoft Edge where
Nessus is running and click Admin --> Sign Out in the top-right corner.
40. Once the session is successfully logged out, a Signed out successfully.
Goodbye, admin notification appears.
41. This concludes the demonstration of performing vulnerability assessment using
Nessus.
42. Close all open windows and document all the acquired information.
GFI LanGuard scans, detects, assesses, and rectifies security vulnerabilities in your network and
connected devices. It scans the network and ports to detect, assess, and correct security
vulnerabilities, with minimal administrative effort. It scans your OSes, virtual environments, and
installed applications through vulnerability check databases. It enables you to analyze the state of
your network security, identify risks, and address how to take action before it is compromised.
Here, we will use GFI LanGuard to perform vulnerability scanning on the target system.
4. On the next page, enter the required details and select the I agree to GFI
Software terms of service and privacy policy and consent to GFI Software to
process data checkbox and click Start my free trial
5. The Download your GFI LanGuard trial page appears; click the Download
your free trial button.
12. The GFI LanGuard License Key window appears. Paste the received activation
key in the Enter License Key field and click OK.
13. GFI LanGuard starts installing after the completion of the installation; when
the GFI LanGuard Setup window appears, click Next.
14. The End-User License Agreement wizard appears; accept the terms and
click Next.
19. The HTTPS Settings wizard appears; keep the name in its default and
click Next.
27. A window indicates that a scan on the local machine is already in progress.
Allow the scan to finish analyzing vulnerabilities in the host machine.
29. The Launch a New Scan page appears: specify the details required to scan a
target/machine as follows:
o Enter the IP address of the machine in the Scan Target field (here, the target
machine is Windows Server 2016 [10.10.10.16]), and ensure that the Full
Scan option is selected from the Profile drop-down list.
o Ensure that Currently logged on user is selected in the Credentials drop-
down list.
o Click Scan.
This may vary in your lab environment.
30. GFI LanGuard takes some time to perform the vulnerability assessment on the
intended machine.
31. Once the scanning is complete, a Scan completed! message is displayed
under Scan Results Details, as shown in the screenshot.
32. To examine the scanned result, in the left pane under Scan Results Overview,
click the IP address (10.10.10.16) node to expand it. The Vulnerability
Assessment and Network & Software Audit nodes are displayed, as shown in the
screenshot.
35. Click System Information to view detailed information about the target system
under the Scan Results Details section in the right pane.
36. Expand the System Information node and click Shares to view the details of
shared folders in the target machine.
37. Similarly, you can click the Hardware and Software nodes to view detailed scan
information.
38. Click the Dashboard tab to display the scanned network information. In the left
pane, expand Entire Network, and then CEH; then, click SERVER2016.
In real-time, using this vulnerability information about the target systems can be
used to develop and design exploits suitable to break into a network or a single
target.
40. You can further explore the tool by clicking on various options. For instance,
click on Software from the options at the top to view a list of applications installed
on the target machine under the Application Category list. You can also click on
any application (here, Google Chrome) to view its detailed information
under Details sections, as shown in the screenshot.
41. Click on the Vulnerabilities option; a list of various categories of vulnerabilities
appears under the Vulnerability Types section. Click on any category of
vulnerability (here, High Security Vulnerabilities): detailed information on this
category is displayed under the Details section, and a list of vulnerabilities is
displayed under the Vulnerability List section.
42. You can further explore scanned results by clicking various options such
as Patches, System Information, Hardware, and Ports.
47. The Save As window appears; set the download location to Desktop. Rename
the file to Vulnerability Status Report.html and click Save.
48. The GFI LanGuard pop-up appears; click Yes to open the file.
49. In the How do you want to open this file? pop-up, select any web browser
(here, Firefox) and click OK.
50. The Vulnerability Status report appears; you can scroll down to view detailed
information regarding discovered vulnerabilities.
51. This concludes the demonstration of scanning network vulnerabilities using GFI
LanGuard.
52. Close all open windows and document all the acquired information.
Nikto is an Open Source (GPL) web server scanner that performs comprehensive tests against
web servers for multiple items, including over 6700 potentially dangerous files/programs, checks
for outdated versions of over 1250 servers, and version specific problems on over 270 servers. It
also checks for server configuration items such as the presence of multiple index files and HTTP
server options; it will also attempt to identify installed web servers and software.
Here, we will perform web servers and applications vulnerability scanning using CGI scanner
Nikto.
A tuning scan can be used to decrease the number of tests performed against a
target. By specifying the type of test to include or exclude, faster and focused testing
can be completed. This is useful in situations where the presence of certain file types
such as XSS or simply “interesting” files is undesired.
7. In the terminal window, type nikto -h (Target Website) -Tuning x (here, the
target website is www.certifiedhacker.com) and press Enter. Nikto starts scanning
with all the tuning options enabled.
-h: specifies the target host and x: specifies the Reverse Tuning Options (i.e., include
all except specified).
8. The result appears, displaying various information such as the name of the
server, IP address, target port, retrieved files, and vulnerabilities details of the target
website.
10. In the terminal window, type nikto -h (Target Website) -Cgidirs all, (here, the
target website is www.certifiedhacker.com) and hit Enter.
-Cgidirs: scans the specified CGI directories; users can use filters such
as “none” or “all” to scan all CGI directories or none).
11. The target website does not have any CGI directory; therefore, the same result
as the previous scan was obtained.
You can use try this command on another website to obtain information about CGI
directories.
12. Now, we will save the scan results in the form of a text file on Desktop. To do
so, type cd and press Enter to jump to the root directory.
-h: specifies the target, -o: specifies the name of the output file, and -F: specifies the
file format.
17. Close all open windows and document all the acquired information.