Lab 9: Pen Testing (NESSUS)



Similar documents
Lab 7: Introduction to Pen Testing (NMAP)

Using Internet or Windows Explorer to Upload Your Site

IIS, FTP Server and Windows

Vulnerability Assessment Lab

Patch Management. Module VMware Inc. All rights reserved

IDS and Penetration Testing Lab II

Quick Start Guide. Hosting Your Domain

Connecting to the School of Computing Servers and Transferring Files

IDS and Penetration Testing Lab ISA656 (Attacker)

Managing Qualys Scanners

SNI Vulnerability Assessment Report

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Lab Objectives & Turn In

Vulnerability analysis

Laboration 3 - Administration

1 Download & Installation Usernames and... Passwords

Configuring Security for FTP Traffic

How to use

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

OCS Virtual image. User guide. Version: Viking Edition

Vulnerability Remediation Plugin Guide

FTP Accounts Contents

IDS and Penetration Testing Lab ISA 674

Sentral servers provide a wide range of services to school networks.

NAS 109 Using NAS with Linux

Ad Hoc (Temporary) Accounts Instructions

Montefiore Portal Quick Reference Guide

Scan to Quick Setup Guide

How to use FTP Commander

Advanced Digital Imaging

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

Using Microsoft Expression Web to Upload Your Site

Scan to FTP (File Transfer Protocol)

Why do I need a pen test lab? Requirements. Virtual Machine Downloads

Setting Up Sharp MX-Color Imagers To Scan To

The Reprographics Online E-Copy Process is used to submit print jobs to the RUSD Reprographics department.

PRiSM Security. Configuration and considerations

VCW FTP Microsoft Outlook Add-In Configuration and Implementation

HOW TO RETRIEVE FILES FROM THE TARGET ANALYTICS FTP SITE

Quick Reference Guide PAYMENT GATEWAY (Virtual Terminal)

1 Scope of Assessment

Post Exploitation. n00bpentesting.com

Sophos Endpoint Security and Control standalone startup guide

Campus VPN. Version 1.0 September 22, 2008

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Installation Guide. (You can get these files from

HOW TO CONNECT TO FTP.TARGETANALYSIS.COM USING FILEZILLA. Installation

Information & Communication Technologies FTP and GroupWise Archives Wilfrid Laurier University

Configuring Web services

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

WHMCS LUXCLOUD MODULE

Microsoft Baseline Security Analyzer (MBSA)

1 Disabling Access to USB Mass Storage Devices

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Step by Step. Use the Cloud Login Website

State Health Repository Tool (SHRT) Testing Instructions

Lab Configuring Access Policies and DMZ Settings

Running a Default Vulnerability Scan SAINTcorporation.com

Getting Started Guide

ECE 4893: Internetwork Security Lab 12: Web Security

IBM Security QRadar Vulnerability Manager Version User Guide IBM

Global TAC Secure FTP Site Customer User Guide

Accessing the Media General SSL VPN

Guide to Using Citrix at SLU (Windows)

Configuration and Access of FTP Server

Quick Scan Features Setup Guide

Using Virtual Machines

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Background (

VCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.

Browser Client 2.0 Admin Guide

tpischeduler tpischeduler TotalFBO tpischeduler TotalFBO Initial Installation tpischeduler TotalFBO tpischeduler

FTP Server Application Guide REV:

Volume SYSLOG JUNCTION. User s Guide. User s Guide

How to Use? SKALICLOUD DEMO

1. Getting Started 2. Installing the Client 3. Logging On 4. Connecting to a Virtual Machine 5. Changing User Preferences 6.

Install FileZilla Client. Connecting to an FTP server

TECHNICAL NOTE TNOI27

Remote Access (FTP and VNC) in ix Developer 2.0 KI

Instructions for Setup and Connecting to Department of Education Secure FTP(SFTP) server January 23, 2013

NOTE: Please refer to the LinkNavigator CD-ROM s IP Setup Utility if you do not know the LinkStation s IP Address or Host Name.

Scan to FTP White Paper Ricoh Americas Corporation May 2007

Dynamic DNS How-To Guide

The FlexiSchools Online Order Management (FOOM) Installation Guide

File Transfer with Secure FTP

Penetration Testing Walkthrough

My FreeScan Vulnerabilities Report

TNote125 Student Locator Framework Notification Diagnostics

17 April Remote Scan

Metasploit: Penetration Testing in a Virtual Environment. (Final Draft) Christopher Steiner. Dr. Janusz Zalewski. CNT 4104 Fall 2011 Networks

Quick DDNS Quick Start Guide

Free Medical Billing. Insurance Payment Posting: The following instructions will help guide you through Insurance Payment Posting Procedures.

MultiSuite for Investor Reporting Windows 7 Upgrade. Internet Explorer (IE) setting updates

Installation and Deployment

Xopero Backup Build your private cloud backup environment. Getting started

Transcription:

Lab 9: Pen Testing (NESSUS) Aim: To provide a foundation in using NESSUS for vulnerability scanning. Time to complete: Up to 90 minutes. Activities: Complete Lab 9: Introduction to NESSUS. Complete Test 9. Leaning Activities: At the end of these activities, you should understand: How to use NESSUS for scans. How to follow through with a vulnerability. Reflective statements (end-of-exercise): You should reflect on these questions: How often do you think you would want to run a vulnerability scan on a corporate Web site? Is just running NESSUS and looking at the results enough for vulnerability scanning? How often do you think an IT Administrator should patch servers? Digital Investigator NESSUS 1

Lab 8: Pen Testing (NESSUS) 1 Details Aim: To provide a foundation in a Pen Testing using NESSUS. 2 Activities L1.1 From your Windows 2003 virtual image, run NESSUS from Start->Programs->Tennable Network Security->Web Client. Login with a username of bill and a password of bill. L1.2 Create a new policy. From NESSUS, go to the Policy tab and select Create a new policy. Next select a Port Scan policy. Next select a Basic setting type, enter a name of your test as My Scan (Figure 1). Next go to the Plugs-In tab and Disable all. Save your new policy. L1.3 Create a template. From NESSUS, go to the Template tab and select New scan. Next give the scan template a name and select your scan policy you just created (Figure 2). Final enter the IP address for your Ubuntu host, and then select the scan type of Run Now. Click on Create Scan and it should now scan the Ubuntu host. L1.4 Analyse results of Ubuntu. From NESSUS, go to the Results tab and wait for the scan to complete. Outline the ports that are open on the Ubuntu: L1.5 Analyse results of Windows 2003. Perform the same steps as previously but this time use the IP address of the Window 20003 virtual image. In this case we are scanning the local machine that has the scanner on it. Outline the ports that are open on the Windows 2003: L1.6 Analyse results of Metasploitable. Perform the same task for the Metasploitable image. Outline the ports that are open on the Metaspoitable image: What can you observe from the Metaspoitable image and why would you not run this image on a real network: Digital Investigator NESSUS 2

Figure 1: Figure 2: L1.7 Now go back and create a policy which has the following plug-ins enabled and rescan each machine (Figure 3): How many critical, medium and low level vulnerabilities are there on Ubuntu: How many critical, medium and low level vulnerabilities are there on Windows 2003: How many critical, medium and low level vulnerabilities are there on Metaspoitable: Digital Investigator NESSUS 3

Figure 3: L1.8 For each scan has NESSUS determined the correct operating system: Operating systems identified: L1.9 The Metasploitable image has an Anonymous login for FTP vulnerability. Go ahead and see if you can log into its FTP server with an Anonymous login. You can do this by either using the command line option of: telnet [Metasploitable IP] 21 and enter the commands to login, or you can download an FTP client and connect. L1.10 The Metasploitable image has a critical VNC vulnerability. Go ahead and see if you can exploit this vulnerability (do this by downloading a VNC client for your Windows 2003 instance). L1.11 The Metasploitable image has vulnerably on the Web server. Access the Web server on the image by opening a browser on the Windows 2003 host and enter the IP address. Outline some of the technical information you can gain from the site: There is a file phpinfo.php on the site. What information does this file release to an intruder: Digital Investigator NESSUS 4

L1.12 The Metasploitable image has the vulnerability of rsh Unauthenticated Access (via finger Information). Go ahead and try and exploit this vulnerability. L1.13 The Metasploitable image has a number of folders that can be viewed from the standard user account. Go ahead and see which folders are viewable from Windows 2003. L1.14 The Metasploitable image has a shared folder which can be viewable (/doc). Go ahead and see if you can exploit this vulnerability. 3 Patching L1.15 For the vulnerabilities defined for the Windows 2003 host. Investigate the information on the vulnerabilities, and see if you can fix some of them. Metasploitable Image (Username: user, Password: user OR Username: msfadmin, Password: msfadmin). Digital Investigator NESSUS 5