Skip to content

ymangt/Vulnerability-Scanner-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

69 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Vulnerability Scanner Lab

A hands-on cybersecurity home lab using OpenVAS (Greenbone) to scan and assess vulnerabilities on an intentionally vulnerable target. This project demonstrates practical skills in vulnerability management, risk analysis, and security reporting.


Skills Demonstrated

Domain Skills
Vulnerability Management Vulnerability scanning, CVSS-based prioritization, risk assessment, remediation planning
Network Security NAT networking, port analysis, attack surface mapping
Security Tools OpenVAS / Greenbone, VMware Workstation Pro, Metasploitable
Reporting & Analysis Scan report interpretation, CIA triad impact mapping, written analysis
Relevant Frameworks CompTIA Security+ Domain 4 — Security Operations

Lab Architecture

┌─────────────────────────────────────────────────────┐
│                 VMware Workstation Pro               │
│                  (NAT Network)                       │
│                                                     │
│   ┌───────────────────┐    ┌──────────────────────┐ │
│   │  OpenVAS Scanner   │    │  Metasploitable VM   │ │
│   │  (Greenbone Trial) │───>│  (Scan Target)       │ │
│   │                    │    │  192.168.71.130      │ │
│   └───────────────────┘    └──────────────────────┘ │
│         Scans & Reports          Intentionally      │
│                                  Vulnerable Host    │
└─────────────────────────────────────────────────────┘

Setup

  1. Imported Metasploitable OVA as the scan target — a purpose-built vulnerable Linux VM.
  2. Imported Greenbone Enterprise Trial OVA as the OpenVAS scanner.
  3. Configured both VMs on a NAT network for isolated communication.
  4. Ran a Full and Fast scan (~25 minutes) against the target.

Scan Results

The scan detected 156 vulnerabilities across the Metasploitable VM:

Severity Breakdown

Severity Pie Chart

CVSS Bar Graph

Top Vulnerabilities Identified

Vulnerability CVSS Component Impact
Ghostcat (CVE-2020-1938) 9.8 Apache Tomcat (port 8009) Remote code execution, full system compromise
VSFTPD Backdoor 9.8 VSFTPD (port 6200) Full system access via backdoor
DistCC RCE (CVE-2004-2687) 9.8 DistCC (port 3632) Remote code execution during compilation
Java RMI RCE 9.8 Java RMI (port 1099) Remote code execution via insecure config
FTP Brute Force Login 9.8 FTP (port 21) Unauthorized file access
TWiki XSS (CVE-2005-2877) 6.1 TWiki web app Script injection, session theft
SSL/TLS Weak Ciphers 5.9 SSL/TLS (multiple ports) Data interception via weak ciphers
Cleartext Transmission 5.3 Multiple services Credential capture in plain text

Full Vulnerability List

Vulnerability List


Analysis

Common themes across the 156 findings:

  • Open Ports & Services — SSH, FTP, RMI, and DistCC expand the attack surface unnecessarily.
  • Weak Encryption — Outdated ciphers (DES, RC4) enable man-in-the-middle attacks.
  • Backdoors & Default Credentials — Poor configuration invites trivial exploitation.

Impact mapped to the CIA Triad:

Principle Risk
Confidentiality Cleartext protocols expose credentials and data
Integrity XSS and RCE allow unauthorized data manipulation
Availability DDoS-prone protocols could crash services

Full written analysis: scan-analysis/scan-analysis.md

Full scan report: scan-report/scan-report.pdf


Recommendations

  1. Patch critical vulnerabilities first — Update Apache Tomcat (Ghostcat), remove VSFTPD backdoor.
  2. Reduce attack surface — Close unused ports with firewall rules, disable unnecessary services.
  3. Enforce strong encryption — Require TLS 1.2+ across all services, eliminate weak cipher suites.
  4. Harden credentials — Enforce strong passwords, disable default accounts.
  5. Implement monitoring — Deploy intrusion detection (e.g., Snort) and schedule regular scans.

Technologies Used

Tool Purpose
OpenVAS / Greenbone Vulnerability scanning and reporting
VMware Workstation Pro Virtual machine management and networking
Metasploitable Intentionally vulnerable target for testing

Contact

About

A security lab using OpenVAS to scan and assess vulnerabilities in a test environment, demonstrating Security+ skills.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors