Analyze vulnerabilities with automated vulnerability scanner

Assignment Help PL-SQL Programming
Reference no: EM132321115

Assignment - Vulnerability Discovery and Analysis

Reading and viewing prior to beginning the assignment:

  • Denial of Service
  • APT
  • Attack Timing

Lab Objectives - This activity will address module outcome 1. Upon completion of this activity, you will be able to: Identify and analyze vulnerabilities with automated vulnerability scanner.

In this lab, you will identify a malicious process and then extract the malicious code from the provided system memory using the Volatility Framework that is used by cyber-security professionals globally.

This week we will work with vulnerability identification and analysis. We will leverage an automated vulnerability scanner tool, OpenVas, to scan our target on all TCP ports to identify weakness and cross-reference the results for open ports, running services, and low hanging vulnerabilities we identified in previous lab activity using Nmap. We will sort and export the results and update our table that we started with the Nmap result. The table will be used as a guide to track and help us methodically validate each discovered port, service, and vulnerability for opportunities to take advantage of them and gain system access in the following week, which is focused on exploitation.

Lab Instructions -

Review the provided video for this module and any related reference (OpenVas manual)

Download, install, setup OpenVas vulnerability scanner

Perform a vulnerability scan of the provided Metasploitable target with the specified parameters

Configure the "Scan Task" with your name: Example: Vel Pavlov

Save the scan results in appropriate format to help you update the table with Nmap results. Save the report with your name. Example format VelPavlov.CSV

Update the table with results with the newly discovered vulnerabilities from OpenVas. You will be adding on to the table with results from the Nmap activity. You need to add columns for:

  • Vulnerability - brief description
  • CVE Reference - Example, CVE-2017-2932
  • CVSSv2 or 3 provided by the OpenVas - Example, 7.5
  • Fix/Recommendation - usually provided by the Vulnerability Scanner. Example, patch to the latest version. The recommendation will be specific to the vulnerability.

Next week, exploitation, you will add the following columns to the table with results

  • Exploit - what is the exploit you used to gain access to the system or escalate privileges
  • Exploit Success - was the exploit successful or not

Example table with contents.

Lab Deliverables -

  • Make sure each full-screen screenshot is accompanied by a brief explanation of the results, file, etc.
  • If you upload only screenshots without explanation, you will receive "0" points for the assignment.
  • Do not upload just screenshots or you will receive "0" points for the assignment.
  • If you do not upload full-screen screenshots, you will receive "0" points for the assignment.
  • Full-screen screenshot showing the configuration for the OpenVas scan with your name (all TCP ports, full and fast scan, against the Metasploitable VM).
  • Full-screen screenshot showing the completed scan with your name.
  • Full-screen screenshot showing the saved report with results with your name.
  • Updated Nmap table with results with the vulnerability information as specified in the "Instructions" section of this lab.

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer.

Attachment:- Assignment File.rar

Verified Expert

In this assignment we have perform analysis of metasploit. I have download the VMware for linux metasploit. Here ,I have done analysis of vulnerability and also install openvas and configure openvas .And finally done analysis and find the vulnerability.

Reference no: EM132321115

Questions Cloud

What are the most significant ethical considerations : What are the most significant ethical considerations that must address in a research proposal? Why?
What archetype has march been influenced by : How do you know this? How does this influence his behavior? Is Mark aware of its influence? Explain.
What is mark attitude : What is Mark's attitude, according to Jungian theory? Provide evidence for your answer
Find an example of a freudian defense mechanism : Find an example of a Freudian defense mechanism that Hank uses in this description. Explain it.
Analyze vulnerabilities with automated vulnerability scanner : M6A1 Assignment - Vulnerability Discovery and Analysis - Identify and analyze vulnerabilities with automated vulnerability scanner
What is the implicit association test in regard to social : What is Media Violence and Aggression in regard to SOCIAL PSYCHOLOGY? What is the Implicit Association Test in regard to SOCIAL PSYCHOLOGY?
How does stress and reactions to stress contribute : How does stress and reactions to stress contribute to illness? which illness? can you share any personal experience when stress contributed to an illness?
How much does nature vs nurture influence one personality : How much does Nature vs Nurture influence one's personality? Why? Examples?
Can we know that other people have a conscious mind : Can we know that other people have a conscious mind? Can their consciousness be studied scientifically? How?

Reviews

inf2321115

7/23/2019 4:35:53 AM

this is terrific!!!! thanks so much:) Very good efforts by the team and experts, dealing part from the team was very good and the prices are very cheap that any student can afford it.

len2321115

6/12/2019 11:16:06 PM

HINT: You can use Excel’s compare feature to compare two Excel files to show matches and differences. The OpenVas CSV or perhaps even XML file will need to be imported into Excel and saved as at least XLS*. You may also be able to use the “Discover Script” parser for OpenVas to normalize the table with results. NOTE: I do not expect you to complete the “Exploit” and “Exploit Success” columns. This is a preview for next week so you have an idea of what the finished table will look like.

len2321115

6/12/2019 11:16:01 PM

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. For those assignments that are not written essays and require uploading images or PowerPoint slides, please follow uploading guidelines provided by your instructor. Check your work and correct any spelling or grammatical errors. When you are ready to submit your work, click "Upload Submission." Enter the submission title and then click on "Select a file to upload." Browse your computer, and select your file. Click "Open" and verify the correct file name has appeared next to Submission File. Click on "Continue." Confirm submission is correct and then click on "Accept Submission & Save."

Write a Review

PL-SQL Programming Questions & Answers

  Display customers table and its fields in sql

Display all the LastNames from the Customers table and any associated OrdersIDs from the Orders Table. Show the LastName even if they do not have any associated orders. Order the results by LastName in ascending order.

  Specify the algorithm using a flowchart

Given M students, where M is a positive integer, develop an Algorithm to compute the numbers of 1st and 4th year students respectively. The students' years of study are provided, one at a time, as input to the algorithm. Specify the Algorithm usin..

  Define union of a table

Would the data in the 4th column have much "meaning" or "context" at that point?

  F does not logically imply

Given R = (J,K,L ) and the set F of FDs J -> K and L -> K , show that F does NOT logically

  Create sql procedure to print out names and grade of student

Please create a PL/SQL function to return the average grade of students taking a given class in a given year and semester. The input parameters are the class name, year, and semester. Please write an anonymous PL/SQL program to call the function a..

  Create gui which allow for input and display of student data

Create a GUI which allows for input and display of student data. It should include buttons to save a record, display all records.

  Explain different types of operators used in oracle

Assignment 1:Ques1. Explain different types of operators used in ORACLE.Ques2. Explain the following commands with an example:

  Explain the sql commands union intersect and minus

explain the SQL commands, UNION, INTERSECT, and MINUS. Include concepts like union-compatibility, syntax alternatives like IN and NOT IN, various JOIN options.

  Write sql queries to produce list occurrences of adv pastels

Write SQL queries to produce the List all occurrences of Adv. Pastels. Include all associated fields for each occurrence of the class.

  Explain the factor necessary to ensure referential integrity

Identify which data components are the entities and attributes, and the relationship between each using an object representation diagram through the use of graphical tools such as Microsoft Visio, or an open source alternative such as Dia.

  Write a pl/sql solution that displays the registration

Write a PL/SQL solution that displays the registration and the maximum and the minimum miles travelled by a car during the rental period for all the bookings where the booking has been paid for.

  Create a basic query that will extract information from book

Create a basic query that will extract the following information from the books, title id, title, publisher, pubdate, edition and cost. Order by publisher.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd