Royal Military College of Canada

Department of Electrical and Computer Engineering

EEE473 Computer Network Design
Dr G.S. Knight
Dr S. Leblanc

Lab 6 Part 2 - Vulnerability Scanning with OpenVAS

References


Introduction

This exercise is an introduction to a vulnerability scanner called the Open Vulnerability Assessment System, OpenVAS.  Initially you will sweep the Team and Common Network for reachable hosts.  Then you will scan several hosts to determine their open services, fingerprint the operating systems and applications, and listting known vulnerabilities.  Finally, you will choose a few vulnerabilities for which you will find known attacks.


Part 1 - Sweeping the network with nmap

Set-up

Set up your exercise environment according to the specifications below, and annotate Figure 1 accordingly. The setup for this exercise is identical to that of Lab 6 Part 1.

Figure 1 - Exercise Network

Figure 1 - Exercise Network

Network Reconnaissance


Part 2 - Vulnerability scanning with OpenVAS

OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. It advertises itself as, "The world's most advanced Open Source vulnerability scanner and manager." We will use OpenVAS to conduct a vulnerability assessment of the machines identified as part of the network reconnaissance conducted above.

Figrue 2 - OpenVAS Welcome Screen

Figure 2 - OpenVAS


OpenVAS is a GUI-based application and is relatively easy to use once you learn a few basic functions. Before you begin feel free to explore the various functions available within OpenVAS; i.e., Scan Management, Asset Management, etc.


Part 3 - Vulnerability assessment

When you have completed all OpenVAS scanning review the results for each host.

Identification Network IP High Treats Medium Threats Low Threats





















Shutting down

You are not done yet - see next page!


Part 5 - Matching vulnerabilities with attacks

    1.  
    2.  
    3.  

Conclusion

In this exercise you have learned the usefulness of a more powerful open-source vulnerability scanner than one which just performs port scanning. Understanding which specific vulnerabilities exist on your network provides invaluable information that should be used for:

  1. planning and prioritizing patch management efforts;
  2. planning and prioritizing intrusion detection efforts;
  3. evolving / improving security architecture; and
  4. evolving / improving respective security policies, directives and guidelines

Submit your lab report by e-mail. Place files together in a  zip file before sending. Include your report and network traffic dump files.