Skip to content

neelspatel999/Vulnerability-Management-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 

Repository files navigation

Vulnerability-Management-Lab

Description

This lab exercise focuses on performing credentialed vulnerability scans against Windows 10 Host Virtual Machine on Microsoft Azure Cloud platform using Nessus Vulnerability Scanner. It involves conducting the Vulnerability Assessments with Nessus and remediating the vulnerabilities.

Utilities

  1. Install Nessus Essentials:https://www.tenable.com/products/nessus/nessus-essentials
  2. Microsoft Azure Cloud Service (To Deploy Windows 10 VM):https://azure.microsoft.com/en-us/free/

Note: Get Activation Code from your email after signing up for Nessus Essentials. Save the personalized url link for Nessus along with your username and password securely.

Virtual Machine Environment (Azure Cloud Platform)

Windows 10 Pro (Standard D2s v3; 2vcpus, 8GiB memory)

Lab Walk-through

First Step involves signing up for a Microsoft Azure cloud account to deploy Windows 10 VM: https://azure.microsoft.com/en-us/free/

Click on the 'Virtual Machine' option and then select 'Create' with the option Azure Virtual machine.

Screenshot 2023-02-28 at 12 54 07 AM

                                  Figure 1. How to deploy Virtual Machine on Azure cloud 

On the 'Create a virtual machine' page,

  • for the Basics section, fill out details to deploy a new VM with configuration of your choice. I used Windows 10 Pro (Standard D2s v3; 2vcpus, 8GiB memory) for my configuration. For
  • For the Networking section, make note to change the NIC network security group from Basic to Advanced to set custom Inbound Security Rules. Include Source host to be your own IP with any port and Any Destination IP with any port. Set a security id in increment of 100 from 100-1000. Lower the number higher the priority of rule. Set the rule to Allow.

Screenshot 2023-02-28 at 1 00 30 AM

                           Figure 2. Specifying the details to deploy Virtual Machine on Azure cloud 

After success deployment of Windows 10 VM on Azure cloud, try RDP login from local machine to the Windows 10 VM with the provided public IP address in the details of the deployed VM on the Azure cloud. Use the username and password that you provided while creating a virtual machine in Basics section on Azure cloud.

After successful RDP login, you can graphically interact with the remote desktop of the Windows 10 VM.

Now check the network connection between VM and local machine by sending ping from local machine to VM. Use the following command in your local terminal to check if the connection is up: ping If the connection is up, the request won't time out. If the connection is down, the request will time out. In that case, turn off the Firewall (Domain, Public, private) in your VM by typing wf.msc in search menu to locate the options for turning the Firewall off. Now try the same command as above in terminal to check if the connection is up.

Second utility to install is Nessus essentials, which is a Vulnerability Scanner, helpful in performing different type of scans based on user's needs. The custom reports can be generated with the findings to conduct Vulnerability Assessments and remediate Vulnerabilities. Installation link for Nessus: https://www.tenable.com/products/nessus/nessus-essentials

After the installation is completed, the url with username and password need to be saved securely for future logins. Now, the New Scan option to explore the variety of different scanners that Nessus offers to help in conducting Vulnerability Assessments. First step should typically involve conducting Basic Network Scan. In Settings, you need to provide the Name and Target machine's IP (Public IP of VM in our case). We will do non-credentialed scan first to check if the scanner is able to scan the target machine successfully and give us Vulnerability report. If this part is successful, then it ensures that the scanners is functioning to look out for vulnerabilities in the provided target IP. Here is the one of the page to the generated report after running non-credentialed Basic Network Scan:

Screenshot 2023-02-28 at 4 33 14 AM

                                      Figure 3. Non-credentialed Nessus Scan Report 

It can be noticed that vulnerabilities is categorized into different level of severity: Critical, High, Medium and Low. This is decided based on the CVSS v3.0 scoring system ranging from 0-10. CVSS stands for Common Vulnerability Scoring System that is used on the basis of three metric groups: Base, Temporal, and Environmental.

Screenshot 2023-02-28 at 2 47 41 AM

                                       Figure 4. CVSS v3.0 Metric groups (Reference #2)

Screenshot 2023-02-28 at 2 53 38 AM

                                      Figure 5. CVSS Metrics and Equations (Reference #2)

Now we will configure our VM to be ready for performing credentialed scans. First, enable the Remote Registry by going to the Services in your VM. Then, enable your File and Printer Sharing option. Further, change the the user account control to 'Never notify' by going to the User Account Control settings. Next, we will go to Registory Editor to add a key to further disable user account control for future remote account scans that we will use. Restart the VM. Fill out the credential details (Windows option) on Nessus for Windows 10 VM. Run the scan again. Now you can notice the huge increase in the number of vulnerabilities found by the scanner because of the credentialed scan this time.

Screenshot 2023-02-28 at 4 43 51 AM

                                          Figure 6. Credentialed Nessus Scan Report (Page 1)

Screenshot 2023-02-28 at 4 44 25 AM

                                           Figure 7. Credentialed Nessus Scan Report (Page 2)

Now let's download an older version of Firefox browser on your VM and try running scanner to how the results change this time. We notice the vulnerabilities increased toward more criticals and highs as compared to before. This shows that older version (deprecated) of Firefox browser is another vulnerability that can be remediated.

Screenshot 2023-02-28 at 5 00 42 AM

                                      Figure 8. Report after installing deprecated Firefox on VM (Page 1)                                           

Screenshot 2023-02-28 at 5 01 14 AM

                                      Figure 9. Report after installing deprecated Firefox on VM (Page 2) 

Screenshot 2023-02-28 at 5 01 27 AM

                                      Figure 10. Report after installing deprecated Firefox on VM (Page 3) 

Lets remediate the vulnerability by upgrading the Mozilla Firefox version to latest one. Run the scan again. We can notice the decrease in the criticals and highs by remediating the vulnerability.

Screenshot 2023-02-28 at 5 19 37 AM

                                       Figure 11. Report after upgrading deprecated Firefox version on VM (Page 1)

Screenshot 2023-02-28 at 5 19 59 AM

                                       Figure 12. Report after upgrading deprecated Firefox version on VM (Page 2)

References

  1. Madakor J. (2021), Nessus Tutorial for Beginners: Vulnerability Management www.youtube.com. Accessed February 28, 2023. https://www.youtube.com/watch?v=lT6Px9zJM3s
  2. Common Vulnerability Scoring System v3.0: Specification Document. Accessed February 28, 2023. https://www.first.org/cvss/v3.0/specification-document

Ackowlegments

Josh Madakor, Instructor, Software, Content Creator - Youtuber

About

GitHub repository on performing credentialed vulnerability scans against Windows 10 Host Virtual Machine deployed on Microsoft Azure Cloud platform using Nessus Vulnerability Scanner. Conducting Vulnerability Assessments with Nessus and Remediating the vulnerabilities.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors