Skip to content

Tripati3000/vulnerability-managmentlab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 

Repository files navigation

Buliding Vulnerability Management lab🧑‍💻

SIEM System steps

What is Vulnerability management? 🤔

Vulnerability management involves identifying and addressing weaknesses in computer systems or networks to prevent cyberattacks.

For example if a software program has a known security flaw that hackers could exploit to gain unauthorized access, vulnerability management would entail regularly updating the software with patches or fixes provided by the manufacturer to close that vulnerability and reduce the risk of a successful cyberattack. Additionally, vulnerability management may involve conducting regular security scans and assessments to identify potential weaknesses before they can be exploited by malicious actors.

Tools and resources:

Walkthrough

Step 1

Register Nessus and Download the Windows Server👇

SIEM System steps

Create your Account and Sign up after that you ready to Go đź‘Ť

SIEM System steps

Setup your VMware with Windows 10 then you have to use "Command Prompt" for confirming ipadress of your VMware so type ipconfig

SIEM System steps

Now you have to ping the ipv4 address with your personal computer so lets type ping 10.0.0.189 -t in personal computer command prompt đź‘Ť ( note: -t keep going it untill i stop it )

Step 2

So now lets go to VMware and OFF firewalls 🔥

SIEM System steps

Click on Windows defender firewall properties đź‘Ť

SIEM System steps

Click "OFF" Firewall state on Domain profile , Private profile , Public profile đź‘Ť

SIEM System steps

Step 3

Go go Nessus (web app) Click create Scan👇

SIEM System steps

Click to "Basic Network scan" 👇

SIEM System steps

Name it and Paste the Ip address and save it👇

SIEM System steps

Now we can see in "My Scans" and it will show up this bar, Go to Right and Click "Launch" button✅ After That Click on Today at 10:47 AM you can see Its Running👇

SIEM System steps SIEM System steps

It will scan up your computer without you enter your credentials but if you want Deep Scan then you need to Give your credentials👇

SIEM System steps

After the Scan complete you will see a check mark ✔️ Click on that👇 SIEM System steps

Here you. an see Scan details 👇 SIEM System steps

Go to Vulnerabilities and visit the things you want to cover and you can see all the details with problems and solutions,

SIEM System steps

Step 4

Now, the above provided steps are without credentials lets check setup with credentials đź‘Ť

  • we are going to Setup VMware to be able to accept authenticated scans
  • Provide some credentials to nessus
  • After that we gonna rescan the VMware with credentials
  • Compare the results

Open up your VMWARE >>> Search bar >>> Services(Local) >>> Remote Registry >>> Status = Automatic✅ 👇

Screenshot_20240302-140319

Search bar >>> Network and sharing center >>> Advance sharing settings >>> TurnOn Network discoveryâś… and TurnOn File and printer sharingâś…

Screenshot_20240302-140359

Search bar >>> User account center settings >>> Click OKâś…

Screenshot_20240302-140455~2

Now lets use "Registry Editor"

We have to add a key that will allow the remote account to connect after connecting the registry we gonna add another key to further disable the remote account after we Scan đź‘Ť

  • To open this Go to windows 10 search bar
  • type "regedit"
  • Select Registry editor (Desktop app)
  • Computer
  • HKEY_LOCAL_MACHINE
  • SOFTWARE
  • Microsoft
  • Windows
  • Current version
  • Policies
  • system
  • Create a new file (LocalAccountFilterPolicy)
  • set this value to 1
  • then "Ok"
  • Close it
  • Go and restart your Windows 10 VMwaređź‘Ť

Step 5

Now our window 10 is ready for scan So, Open your windows 10 with your password (Remenber the password)

  • After login go to Nessus

  • Open up your scan which is Windows 10 Single host

  • Move to Right corner Click more

  • Configuration

  • Click to Credentials >>> Give your admin (Windows10VMwarename) and password (whatever you created) and save Screenshot_20240302-194145~2

  • Now run the scan one more time and wait few minutes for taking time đź‘Ť

Step 6

Now after scanning lets check the results and compare them

Before adding credentials âś…

Screenshot_20240302-134639

After adding credentials âś…

Screenshot_20240302-195209

History of scaning âś…

Screenshot_20240302-195558

Remediations ( solutions for upgrade or update your windows 10 )âś…

Screenshot_20240302-195540

VPR Top Threats ⚠️ ( Provides priorities view of top 10 vulnerabilities to help guide and reduce risks )

Screenshot_20240302-195546

Vulnerabilities ( provides more details about risks which is harmfull and you can dive into deep details of risks and their solutions by visiting the Vulnerabilities đź‘Ť

Screenshot_20240302-201051

What we learned from our project🤔🔍

We learned ,

Risk Awareness: We gain a deeper understanding of the vulnerabilities present in our systems and applications, as well as the potential impact they could have on our organization if exploited.

Prioritization: We learn how to prioritize vulnerabilities based on factors such as severity, exploitability, and potential impact on business operations, allowing us to allocate resources more effectively.

Proactive Approach: We understand the importance of taking a proactive approach to cybersecurity by regularly scanning for vulnerabilities, rather than reacting to breaches after they occur.

Collaboration: We recognize the value of collaboration between IT, security teams, and other stakeholders to effectively identify, assess, and remediate vulnerabilities across the organization.Continuous Improvement: We acknowledge that vulnerability management is an ongoing process and that continuous improvement is necessary to adapt to emerging threats and evolving technology landscapes.

Compliance: We learn how vulnerability management practices align with regulatory requirements and industry standards, ensuring that our organization remains compliant and avoids potential fines or penalties.

Conclusion

the successful completion of the vulnerability management project has significantly enhanced our organization's cybersecurity posture. Through assessment, prioritization, and remediation of vulnerabilities, we have fortified our defenses against potential threats, minimized risk exposure, and safeguarded sensitive assets. Moving forward, continued vigilance, regular updates, and proactive measures will be essential to sustain this strengthened security framework and adapt to evolving threats in the dynamic digital landscape.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published