Two persons in each group.
Three computers from the same POD.
Only computers marked with green tape have 32GB RAM.
Task 1: Using OpenVAS
1a/ Scan different networks and find the most interesting one
1b/ Question 0 Submit a PDF-report (auto-generated) of the most "interesting" (one network only) with many CVE's and Vulnerabilities to Canvas
Start a command shell in Kali/Linux
10. OpenVAS does not fit in current RAMdisk< change to 32G
df -h /
sudo mount -o remount,size=32G /run/live/overlay
df -h /
sudo chmod 777 /home/kali
sudo gvm-setup
< downloading stuff takes a loooooooooong time >
< Notus file: 10 minutes, NASL files: 10 minutes, SCAP files: 20mins *-data: 20 mins >
MAKE A COPY OF THE PASSWORD !!!
sudo gvm-check-setup
<output omitted for clarity>
It seems like your GVM-22.5.0 installation is OK.
sudo gvm-start
. If you get errors from "task" saving inside the web-browser, fix it with:
sudo chmod -R 777 /var/lib/gvm
https://127.0.0.1:9392 ← Use Firefox App, remember the port-number
Start a new CLI shell window, and run the command
tail -f /var/log/gvm/*
Go back to GUI and select "Administration" -> "Feed Status"
watch both CLI & GUI simultaneously. Wait for "Status" to become "Current"
Meanwhile you MUST update your photo on mittkonto.hv.se
sudo greenbone-feed-sync
(requires that gvm is stopped, remember start afterwards)Inside the OpenVAS application (via web-browser)
Scan full NETWORKS with OpenVAS, that is /24's etc HOSTS (/32's) are for NESSUS due to license restrictions
Question 1 What chapters in the book from P.C. von Oorschot does the vulnerabilities found, fall under? Make a list of chapter titles!
Question 2 Make a list of vulnerability types and map two or three of the discovered vulnerabilities to these classes?
Question 3 2a/ What is CVE? 2b/ What is CVSS? 2c/ Explain what it has to do with vulnerabilites found by OpenVAS!
2d/ What is the current status of cve and cvss in europe and usa regarding Trump administration?
Question 4 Why is nmap not a tool for cybersecurity, only good for old network security, compared to OpenVAS & Nessus?
This is probably more easy in Windows, not Kali-Linux. Switch to the middle computer, PC-B)
Only scan HOSTS (/32's), not networks, since NESSUS demo
have license restrictions
Task 2: Using Nessus Professional
A. Using the information from the previous LAN-scans :
Scan three different interesting hosts and generate one PDF-report (auto-generated)
B. Submit the PDF-report (auto-generated) of the most "interesting" (one host only) with many CVE's and Vulnerabilities to Canvas
Some hints:
Scan only HOSTS (full IP address) with NESSUS
*NOT* NETWORKS due to license restrictions
Question 5 Why does the findings from Nessus differ from OpenVAS?
Question 6 From what sources does OpenVAS download "signatures"? Where does Nessus get its "feeds"?
Question 7 Why can you feed OpenVAS and Nessus with login credentials?? What is the use of that?
Question 8 Mitigation: 8a/ How does Nessus help you to fix vulnerabilities? 8b/ Can this be automated, so problems can be fixed automatically? if so, how??
Task X eXtra: Try you luck with the scanner "Nikto" , or "Vuls", and scan the most interesting IP (one host), the same as you choose above. Does it give the same report? What differs??
Upload 2 different PDF-reports, and one PDF-document with your answers (total: 3 PDFs)
After Scan