Support de LAB NCA Lab Guide Student
Support de LAB NCA Lab Guide Student
Lab Guide
Version 18.8
DISCLAIMER: Unless otherwise indicated, this lab guide and its design, text, content, selection and arrangement of elements, organization, graphics,
design, compilation, digital conversion and other matters related to this document are protected under applicable copyrights, trademarks and other
proprietary (including, but not limited to, intellectual property) rights and are the property of Rapid7 LLC or the material is included with the permission of
the rights owner and is protected pursuant to copyright and trademark laws. ALL RIGHTS RESERVED. If you have any questions about the use of this
material, please contact [email protected].
Version 18.8
Understanding this Document
To better understand the Rapid 7 Lab Guide instructions, please note the following:
Any text entered in a bold font indicates that you will be clicking on a button, menu, drop down or item.
(Any text entered in italics inside parenthesis are considered special instructions, tips, or best practices that may not be specific
instructions.)
Any text entered in this underlined Courier font indicates that you will be typing the text into a form, field, or command line interface.
‘Any text entered in italics inside a single quote indicates that the student should be looking for this item, section, or heading to continue
the exercise steps.’
Asset IP
Nexpose Console 192.168.1.101
Engine Install 192.168.1.102
Win7 Target 192.168.1.103
Metasploitable2 192.168.1.104
Version 18.8
Table of Contents
Version 18.8
Lab 1: Create a Custom Scan Template
(Open the Nexpose Console, open your Firefox Browser, and click on Nexpose in the Bookmark toolbar if
necessary, login with user1: password1)
Notes: Though you have the ability to create new templates from scratch by selecting the ‘New Scan
Template’ button, you rarely should have to do this. It is advised that you copy an existing template that
closely achieves your scanning objectives by selecting the icon in the column labeled ‘Copy’.
Version 18.8
Lab 2: Creating Static Sites/Launching a Scan
1. From the console, select the Home link on the left menu to get to the Nexpose Dashboard.
2. Under the Sites section click on the Create Site button.
3. Configure the site with the following parameters: Note: Clicking the individual sections at the top (Info &
Security, Assets, etc.) will navigate through the various configuration sections. Each section may have
multiple configuration pages. You can navigate these using the top navigation
a. Info & Security
i. Name the Site ‘US Central Site’. Allow Sally User access to this site.
b. Assets
i. In the include section, enter the range ‘192.168.1.0/24’.
ii. Add ‘192.168.1.1’ to the Exclude list.
c. Templates
i. Select the scan template Full audit enhanced logging- No Web Spider.
d. Engines
i. Select local scan engine.
e. Alerts
i. Create an email alert to ‘[email protected]’ from ‘[email protected]’.
ii. The alert should only occur only if the scan fails. Maximum Alerts to Send: 5
iii. Include the new alert name “US Central Site Failure”
iv. Add the SMTP relay server IP address as: 192.168.1.102
v. You must click SAVE in this dialog box, as it will not save when you go to the next tab.
f. Schedule
i. Click Create Schedule
ii. Enter ‘Start date and time’ to 9pm Pacific on the 10th of next month
iii. Set the Maximum scan duration to 3 hours 30 minutes and Set the Repeat scan every to
every month on the 10th
iv. Set the ‘If a scan reaches the maximum duration’ to ‘continue the scan where it
previously stopped’ Click Save to commit your new schedule.
g. Blackout
i. Click Create Blackout on the left menu.
ii. Enable a blackout that starts on the next Friday from 1-4 am Eastern and repeats
continues every Friday. Click Save to create the new blackout.
4. Click on Save and Scan in the upper right to save your site configuration and start a scan. You may
get a UAC popup asking “Are you sure you want to Save and Scan?” Click Save & Scan.
5. Monitor status of the scan. This should refresh every few seconds.
Version 18.8
Lab 3: Asset Groups
Task 1: Create a Static Asset Group
1. Click the Create button in the top menu, select Asset Group
2. Change the Asset Filter criteria to OS contains Linux.
3. Click the + to add another filter.
4. Create a second filter Host Type contains Virtual Machine
5. Click the Search button.
6. Scroll down to verify you have matching assets.
7. Leave type as Static.
8. Name the new asset group ‘Virtual Linux ’.
9. Enter a brief description
10. Click Save.
11. Verify the new asset group is displayed in the asset group listing, and that it is static.
1. Click the Create button in the top menu, select Dynamic Asset Group.
2. Create a filter with the following criteria:
a. OS contains Windows
b. Vulnerability Title contains SMB
3. Click Search
4. After the search returns results, select create asset group
5. Name the asset group ‘Windows SMB Vulnerabilities’.
6. Enter the name and brief description.
7. Click Save
8. Go to the Nexpose Home page and locate Windows SMB Vulnerabilities. Select the new asset group
to view the assigned assets. (The new asset group may be located on the 2nd page.)
9. Verify the assets displayed in step 8 are included in the asset group.
This group will change over time. New Assets that meet the criteria (from step 3) will be added to the
group with each scan.
Bonus questions:
Version 18.8
Lab 4: Real Context
Task 1: Tag an Individual Asset
1. Search for an asset using the search (magnify glass) icon in upper right with IP Address 192.168.x.x by
entering the string ‘192.168’
2. Click on the IP address 192.168.1.102. If you did not complete the scan in Lab 2, you will not see this asset.
3. From the right side of the page, under User-added Tags, click Add Tags.
4. Click on the Criticality tab
5. Select Very High from the Tab Name dropdown menu, then click Add.
6. Click on the Locations tab
7. In the Tag Name field, type ‘Metasploit Pro’ and click Add.
8. Still in the Locations tag, type ‘Boston’ in the Tag Name field and click Add.
9. Select Custom Tags and enter ‘Rapid7’, select a tag color, and click Add.
10. Verify that the tags for Criticality and Location have been added. These are viewable in the User-
added section of the asset view.
Version 18.8
Lab 5: Automated Actions
1. Click the Automated Actions icon in the left menu.
2. Click the New Action button. This is the circle with the + inside.
3. Select New vulnerability coverage available as the trigger.
4. In the Filter By drop-down list select CVSS score.
5. Choose the modifier ‘is Higher than’.
6. Enter a minimum value of 7.4.
7. Click Next.
8. Select an action from the drop-down list. With new vulnerabilities, the only available action is scan for
new vulnerabilities.
9. Select site US Central Site to scan for the new vulnerabilities.
10. Click Next.
11. Enter the name to ‘CVSS Critical, scan US Central Site’.
12. Click Save Action.
13. Close the Automated Actions window by clicking the X in the upper right.
Version 18.8
Lab 6: Create/Manage Users
Task 1: Update Password Policy
1. From the console, select Administration from the left menu
2. Under the ‘Users’ section, select Manage under Password Policy
3. Update the policy to include the following:
a. Expires every 90 days
b. Must be at least 8 characters’ long
c. Must include at least 1 capitalized letter, 1 symbol (special characters), and 1 number
4. Click Save to update the password policy
Version 18.8
Lab 7: Pairing the Console to an Engine
Note: Linux commands are case sensitive.
Task 1: Get the Shared Secret
1. From the console, select Administration from the left menu, then Manage under the Engines section.
2. Generate a scan engine share secret at the bottom of the page.
3. Write down the shared secret on paper or take a “snip” of the file.
Note: You will be required to manually enter the shared secret in the next task. You cannot copy paste
from one VM to another.
1. Switch to the ‘Engine Install’ Machine. The user name AND password is ‘rapid7’.
2. Click on the Terminal shortcut in the left side menu bar. This will open a command prompt window.
3. Type ‘sudo –i’ and press the Enter key to start an interactive shell session as root. When prompted,
enter the root password, ‘rapid7’.
4. Change to the desktop directory by typing ‘cd /home/rapid7/Desktop’ and then press the Enter key.
5. Issue the list command ‘ls’ to display the files in this directory. The Nexpose install file (/Rapid7Setup-
Linux64.bin) should be listed as one of the files.
6. Change the properties of the Nexpose install file to allow execution of the binary. Type
7. Type ‘./Rapid7Setup-Linux64.bin’ to run the installer. This will launch the install wizard.
Version 18.8
16. After installation, pair with the console, enter the Console Address ‘192.168.1.101’.
17. Leave the default port 40815
18. Enter the shared secret collected during task 1. Click the Test button.
19. You should see a green check mark in status. If not, please review shared secret entry.
20. Click Next and Finish.
21. Check the service by typing: ‘service nexposeengine status’ in the existing terminal .
22. Return to the Nexpose Console VM.
23. From the console, select Administration from the left menu, then Manage under the Engines section.
24. Verify that the new scan engine exists.
Note: This can take 5-15 minutes for the initial connection to establish between the Engine and
Console. Continue to refresh the page until the engine appears.
Version 18.8
Lab 8: Credential Management and Policy Scanning
Version 18.8
Lab 9: Exception Handling
Task 1: Submit an Exception
1. Click on the Home icon. Make mental note of the cumulative risk score in your console.
2. Select Global: Corporate site.
3. From within the site, select an asset with multiple vulnerabilities (instances).
4. Click on any asset to open and scroll down to the vulnerabilities.
5. Choose any vulnerability and click on Exclude in the far right-hand column.
6. In the vulnerability exception window, under the Scope form field, select All Instances on this Asset.
7. Under Reason for field, select Acceptable Risk.
8. In the comments field, enter ‘This vulnerability cannot be remediated due to a business requirement’.
9. Click on the Submit button.
10. Observe the icon and text in the Exceptions column changed from ‘Exclude’ to ‘Under Review’
Version 18.8
Troubleshooting Challenge –
Q: What is the command to update the console via CLI (command line interface)?
Q: Where would you find the logs for the past history scans?
Q: Can you check for updates upon startup? Where do you make sure those are turned on?
Version 18.8
Lab 10: Risk Score
Task 1: Risk Score Adjustment
Version 18.8
Lab 11: Manage Reports
Task 1: Create a Report Template (Document)
1. From the console, select Reports from the left menu.
2. Select Manage report templates.
3. Click the New button to create a new report template.
4. Enter the name ‘1 Document Report Template’.
5. Enter a brief description.
6. For the Template Type, keep the default selection of ‘Document (PDF, HTML, RTF)’.
7. Leave the Vulnerability Details setting as ‘Complete’.
8. Under Preferences, select Display Asset Names and IP Addresses.
9. In the ‘Select sections to include in the template’ section, select the following report sections by
selecting the specific section name, then click the Add button:
a. Cover Page
b. Table of Contents
c. Executive Summary
d. Baseline Comparison (using the two scans we have completed on Day One and Day Two)
e. Discovered Vulnerabilities
f. Vulnerability Exceptions
10. Click Save.
Note: with the selection of ‘Cover Page’, ‘Baseline Comparison’, and ‘Executive Summary’ sections,
options at the bottom of the page appear for each section.
Version 18.8
8. Click on the Configure Advanced Settings hyperlink.
9. Expand the Access Section
a. Under the Report Viewer List, Click Add users.
b. Select John Doe user created in previous lab.
c. Click Done.
10. Expand the Distribution Section
a. Select the checkbox for Send to users on a report access list
b. For the ‘Attach report file as’ option, select File
c. Click Save the report
11. On the View Reports tab, mouse over ‘Training1’. (You may have to navigate to another page on the
report list).
12. Click on the dropdown menu to the left of the report name and select Run
13. Once the report is complete, view the report by clicking on the report name Training1.
Version 18.8
Appendix A: Practice Exam
THIS IS FOR REVIEW AFTER THE COURSE IS COMPLETED. PLEASE STOP HERE FOR NOW.
1. What permissions listed allow a user to view vulnerability data for a site named ‘HQ’? (Select all that
apply)
a. A role that allows View Site Asset Data and access to the ‘HQ’ site
b. A role that allows View Group Asset Data and access to the ‘HQ’ site
c. Everyone can see vulnerability findings if they have access to the site ‘HQ’
d. Global Administrator access
e. None of the above
3. When sending your diagnostic information to support.rapid7.com you are doing it over a TLS-encrypted
session over port 443.
a. True
b. False
6. If the error message "Not enough memory to complete scan" occurs during a scan, which of the
following actions should be considered?
a. Run fewer simultaneous scans
b. Lower the number of scan threads allocated by your scan template
c. Power off the console
d. Both A and B
e. Both A and C
Version 18.8
7. What is the minimum system RAM requirement (in GB) for Nexpose console installations?
a. 32 GB
b. 4 GB
c. 16 GB
d. 12 GB
e. 8 GB
8. Which of the following report data export formats can Nexpose output?
a. CSV Export
b. XML Export
c. Database Export
d. CyberScope XML Export
e. All of the above
9. You have configured a scan for a class C network with the asset scope of 192.168.1.0/24, used the
built in scan template named ‘Full Audit’, and enabled syslog alerts to your SIEM at 10.1.4.2. You have
scheduled the scan to run monthly. Your scan has completed as scheduled, but your Policy Evaluation
report has no data. What is the likely cause?
a. The Full Audit template does not include Policy checks.
b. The Syslog alerts are not being delivered correctly.
c. The scan has likely failed.
d. You have input the scope incorrectly.
10. What URL would you use if trying to reach a remote Nexpose install on another server?
a. http://servername/nsc:3780
b. https://localhost:3780
c. https://serverIPaddress:3780
d. https://serverIPaddress:40814
11. You have a single dual-processor Nexpose console with 8GB of RAM. You currently have no additional
scan engines installed. You are attempting to scan 12 class C networks. Your scans seem to be failing
and you are seeing ‘out of memory’ errors entries in the console log. What is the BEST course action
that you should take to resolve the issue?
a. Increase the console's RAM.
b. Deploy Remote Scan Engines and offload scans from the console.
c. Increase available memory by stopping unnecessary services.
d. Spread your scans over a longer period.
12. Specify the devices to which you can apply custom tags: (Select all that apply)
a. An individual asset
b. Asset groups
c. Sites
d. Reports
e. Scan templates
Version 18.8
13. Performing a filtered asset search is the first step in creating what type of asset groups? (select all that
apply)
a. Full
b. Asset
c. Dynamic
d. Site
14. Which of the following is a factor in the determination of vulnerability severity levels?
a. Temporal Scores
b. CVSS Scores
c. Weighted Scores
d. SANS Vulnerability Scores
1 = c, 2 = e, 3 = d, 4 = a, 5 = b
Version 18.8
Appendix B: Versioning
Version Updates
18.4.1 Updated logo
IP addressing correction
18.4.2 Updated supported OS to include Windows Server 2016
Updated RESTful to v3
18.5.0 Lab updated to 6.5.17
Updated/Corrected IP addresses
Added Troubleshooting Challenge per TechSupport
18.6.0 Rearrange Lab 9
18.7.0 Updated Screenshot Lab 7
18.8.0 Updated LabGuide
Version 18.8