Skip to content

A practical exercise in proactive security: identifying, analyzing, and reporting on vulnerabilities to harden system security posture.

Notifications You must be signed in to change notification settings

swamy-2006/BASIC-VUNLNURABILITY-SCAN-GUIDE

Repository files navigation

BASIC-VUNLNURABILITY-SCAN-GUIDE

  • [This project documents the execution of a comprehensive vulnerability assessment based on a cybersecurity internship task. A virtual lab was established using Kali Linux to deploy and configure the Nessus vulnerability scanner. A full system scan was performed on a target machine to identify security weaknesses and misconfigurations. The findings were analyzed, and a professional report with a prioritized remediation plan was created to address the high-impact vulnerabilities.]

  • Basic Nessus Command-Line Management Below is a quick reference for some of the basic commands used to manage the Nessus installation on a Linux system from the terminal.

Managing the Nessus Service (systemctl) These commands control the main Nessus background service.

sudo systemctl status nessusd.service

  • Checks if the Nessus service is currently running and shows its status.

sudo systemctl start nessusd.service

  • Starts the Nessus service.

sudo systemctl stop nessusd.service

  • Stops the Nessus service.

sudo systemctl restart nessusd.service

  • Restarts the Nessus service. Useful after applying changes.

sudo systemctl enable nessusd.service

  • Configures the service to start automatically on system boot.

  • img alt

  • img alt


  • [1ST WE PERFORMED HOST DISCOVERY SCAN ON 3 MACHINES WITH THE SINGLE INTERNET (MAC,WINDOWS AND LINUX)]

HOST DISCOVERY

In the html file only we can get the information about the host discovery [ip of the linux machine]

10.140.63.116                     

[ip of the Windows machine]

10.140.63.32

[ip of the MAC machine]

10.140.63.55

when we download the report for only over machine it will be like this host discovery_self machine

As the Scan is basic and the host discovery we will get to kmow about the information of the OS


Complete Advanced Scan Report advanced scan on the same machine(linux)

Nessus Scan Report: Analysis and Remediation Plan

📝 Scan Summary

The scan identified a number of security weaknesses, including 3 Critical, 2 High, and 5 Medium severity vulnerabilities.

The most urgent issues are related to outdated and unsupported software components, including Apache Log4j, ClamAV, Ruby RACK, and SQLite. These vulnerabilities pose a significant risk, potentially allowing for Remote Code Execution (RCE), Denial of Service (DoS), or arbitrary code execution.

🛡️ Prioritized Remediation Plan

The following steps should be taken to address the most severe vulnerabilities, listed in order of priority.

1. Critical Vulnerability: Apache Log4j End-of-Life (RCE)

  • The Problem: An unsupported version of Log4j (1.2.16) is installed. This version is End-of-Life and contains multiple critical vulnerabilities, including CVE-2021-4104, which can lead to Remote Code Execution.
  • Location: /usr/share/javasnoop/lib/log4j-1.2.16.jar
  • Solution: The safest and most direct solution is to remove the vulnerable library. As it is part of an optional tool (javasnoop), its removal is unlikely to impact core system functionality.
    sudo rm /usr/share/javasnoop/lib/log4j-1.2.16.jar

2. Critical Vulnerability: ClamAV Multiple Vulnerabilities

  • The Problem: The installed version of the ClamAV antivirus engine (1.4.2) is vulnerable to multiple issues, including a buffer overflow (CVE-2025-20260) that could be triggered by a malicious file, leading to a crash or potential code execution.
  • Location: /usr/bin/clamscan
  • Solution: Upgrade ClamAV to the latest version by performing a full system update.
    sudo apt update && sudo apt full-upgrade -y

3. High Vulnerability: Ruby RACK Denial of Service (DoS)

  • The Problem: A version of the Ruby RACK library (2.2.11) used by Metasploit is vulnerable to a Denial of Service attack (CVE-2025-46727), where a specially crafted request could crash the application.
  • Location: /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems//rack-2.2.11
  • Solution: This library is a dependency of another application. The recommended fix is to run a full system update, which will update Metasploit and its components.

4. High Vulnerability: SQLite Multiple Vulnerabilities

  • The Problem: The installed version of SQLite (3.46.1) contains multiple vulnerabilities, including CVE-2025-3277, which can lead to a heap buffer overflow and allow an attacker to execute arbitrary code.
  • Location: /bin/sqlite3
  • Solution: A full system update will upgrade SQLite to the latest patched version.

⚙️ Other Notable Issues

  • SSL Certificate Cannot Be Trusted (Medium): The scan flagged the SSL certificate on port 8834. This is the Nessus web interface itself, which uses a self-signed certificate by default. For local use, this finding is expected and can be safely ignored.

General Security Recommendation

The majority of the critical and high-severity vulnerabilities identified in this report can be resolved with a single, comprehensive action: performing a full system update and upgrade. This is the most effective way to apply security patches across a Debian-based system like Kali Linux.

sudo apt update && sudo apt full-upgrade -y
  • Vulnerability Scanner: Nessus Essentials For this project, Nessus Essentials was selected as the primary vulnerability scanning tool. Nessus is a powerful and widely-used remote security scanner developed by Tenable, Inc. The Essentials version is a free-to-use edition ideal for educational purposes and for scanning in smaller environments.

  • Setup and Installation The installation and configuration of Nessus were performed on a Kali Linux system. The process involved several key steps:

Registration: A license for Nessus Essentials was obtained by registering on the official Tenable website, which provided a unique activation code via email.

Installation: The appropriate .deb package for Debian-based systems was downloaded. The installation was carried out from the terminal using the dpkg -i command.

Service Initialization: After installation, the Nessus background service (nessusd) was started and enabled using systemctl.

Web-Based Setup: The final configuration was completed through the web interface, accessible at https://localhost:8834. This involved creating an administrator account and providing the activation code.


  • ##COMPREHENSIVE VULNURABILITY ANALYSIS

ANALYSIS ON THE SELF MACHINE

High-Impact Vulnerability Analysis

The scan identified several high-priority vulnerabilities that require immediate attention. These are primarily caused by outdated software packages with known exploits.

Severity Vulnerability Cause & Impact Recommended Solution
Critical Apache Log4j 1.x End-of-Life An unsupported logging library (log4j-1.2.16.jar) is present. This exposes the system to multiple flaws, including Remote Code Execution (RCE). Remove the vulnerable library, as it is part of a non-essential tool (javasnoop).
Critical ClamAV < 1.4.3 Multiple Vulnerabilities The installed antivirus engine (1.4.2) is outdated and vulnerable to buffer overflows, which could allow for RCE. Perform a full system upgrade to install the latest security patches.
High Ruby RACK < 2.2.14 Denial of Service An outdated Ruby library (rack-2.2.11), a dependency of Metasploit, can be crashed by a malicious web request, causing a Denial of Service (DoS). Remediated by performing a full system upgrade, which will update all framework dependencies.
High SQLite < 3.50.2 Memory Corruption The system's database engine (3.46.1) is outdated and contains memory corruption flaws that could be exploited. Remediated by performing a full system upgrade.

General Remediation Command

A full system upgrade will resolve the majority of these critical software vulnerabilities.

sudo apt update && sudo apt full-upgrade -y

Vulnerability Management

1. What is vulnerability scanning?

Vulnerability scanning is an automated process that identifies security weaknesses (vulnerabilities) in your computers, networks, and applications. It uses a software tool called a vulnerability scanner, which checks your systems against a database of thousands of known security flaws. The end result is a report that lists potential security holes, allowing you to fix them before an attacker does. Think of it as a routine security check-up for your digital infrastructure. 🩺


2. Difference between vulnerability scanning and penetration testing?

While they both aim to improve security, they are very different activities. The key difference is between listing weaknesses and exploiting them.

Feature Vulnerability Scan Penetration Test
Method Automated 🤖 Manual & Human-led 👩‍💻
Goal Find potential weaknesses Confirm & exploit weaknesses
Scope Broad (breadth over depth) Narrow (depth over breadth)
Frequency High (e.g., weekly/monthly) Low (e.g., annually)

3. What are some common vulnerabilities in personal computers?

Most vulnerabilities on personal computers stem from simple oversights. Common ones include:

  • Outdated Software: The single biggest risk. Not installing updates for your OS (Windows, macOS) or applications (Chrome, Adobe Reader) leaves known, fixable holes open.
  • Weak or Reused Passwords: Passwords that are easy to guess or used across multiple websites.
  • Phishing & Social Engineering: Falling for scam emails or messages that trick you into revealing sensitive information or installing malware.
  • Missing or Outdated Antivirus: Lacking protection to detect and remove malicious software.
  • Misconfigured Firewalls: Turning off the built-in firewall or having incorrect rules that expose your computer to the internet.

4. How do scanners detect vulnerabilities?

Vulnerability scanners act like automated detectives. They systematically probe a target system and compare what they find to a massive database of known flaws. Their primary methods include:

  1. Banner Grabbing: The scanner identifies the software and version number of services running on the system (e.g., "Apache Web Server version 2.4.53"). It then checks its database to see if that specific version has any known vulnerabilities.
  2. Signature Analysis: It sends specific, crafted requests to the system and analyzes the response. A particular response can act as a "signature" that confirms the presence of a vulnerability.
  3. Configuration Check: The scanner looks for common misconfigurations, such as default passwords, open ports that shouldn't be, or insecure protocol settings.
  4. Credentialed Scans: If given login access, the scanner can perform a much deeper check from the inside, looking for things like missing security patches and weak user permission settings.

5. What is CVSS?

CVSS stands for the Common Vulnerability Scoring System. It's an open, industry-standard framework for rating the severity of a security vulnerability.

CVSS assigns a numerical score from 0.0 to 10.0, along with a severity rating:

  • 0.0: None
  • 0.1 - 3.9: Low
  • 4.0 - 6.9: Medium
  • 7.0 - 8.9: High
  • 9.0 - 10.0: Critical 🚨

This standardized score helps organizations prioritize which vulnerabilities pose the greatest threat and need to be fixed first.


6. How often should vulnerability scans be performed?

The ideal frequency depends on the system's importance and regulatory requirements, but a good general guideline is:

  • Critical Systems: For public-facing servers or systems handling sensitive data, scans should be run frequently, such as weekly or even daily.
  • Internal Networks: For general internal office systems, monthly or quarterly scans are often sufficient.
  • After Major Changes: Always run a scan after deploying a new application, server, or making significant network changes.

7. What is a false positive in vulnerability scanning?

A false positive is an error where the scanner reports a vulnerability that does not actually exist. It's a false alarm.

This can happen if the scanner misinterprets a system's response or if a security patch has been applied in an unusual way that doesn't update the software's version number. False positives are problematic because they waste security teams' time investigating non-existent issues.


8. How do you prioritize vulnerabilities?

A scan can return hundreds of results. Effective prioritization is crucial and involves looking beyond just the raw numbers:

  1. Start with CVSS Score: Address Critical and High severity vulnerabilities first. This is the most important starting point.
  2. Consider Asset Criticality: A vulnerability on a public, payment-processing server is far more urgent than the same vulnerability on an isolated test machine. Ask, "How important is this system to the business?"
  3. Check for Active Exploits: Is there a known, easy-to-use exploit for this vulnerability available to attackers? A vulnerability that is being actively exploited "in the wild" should be moved to the top of the list.
  4. Evaluate Mitigating Controls: Are there other security layers (like a firewall or access restrictions) that make the vulnerability harder to exploit? This can help lower its immediate priority.

By combining these factors, you move from a simple list of vulnerabilities to a strategic, risk-based remediation plan.


  • [NOTE : THE MOST OF THE CONTENT FROM THE AIs with MY OBSERVATION and THOUGHTS]

About

A practical exercise in proactive security: identifying, analyzing, and reporting on vulnerabilities to harden system security posture.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages