Professional Documents
Culture Documents
Module Assignment
Module Assignment
Module Assignment
Final – Assignment 7
Kevin Splittgerber
After spinning my wheels with Nagios Core, I switched over to trusty Wireshark. The
network capture went smoothly and saw traffic from my Ubuntu 18 machine to the
FINAL ASSIGNMENT 4
metasploitable2 machine.
Vulnerability scanners are essential tools in the security engineer’s toolbox. Automated
scanning of systems is a fast way to ensure compliance and test systems after upgrades.
FINAL ASSIGNMENT 5
Scanners check for known vulnerabilities from databases such as Common Vulnerabilities and
Exposures (CVE).
Evaluation Criteria
Must be easy to install & configure, GUI based, actively maintained, mature
detections. The criteria above is assigned a weight for evaluation, each criterion is evaluated on
a 10 point scale. Initial acquisition cost and ongoing maintenance costs should obviously a
component to evaluate, however for the purpose of this assignment it is not considered as I will
Criterion Weight
Ease of installation & configuration 10
GUI, high quality 15
Actively Maintained 10
Mature Documentation & Educational Resources 20
Support Channels 10
Easy to understand detection reports 20
Accurate Detections 15
Evaluated Software
Nessus OpenVAS
Score Weighted Score Weighted
Criterion Weight /10 Score /10 Score
Ease of installation & configuration 10 10 100 5 50
GUI, high quality 15 10 150 8 120
Actively Maintained 10 10 100 10 100
Mature Documentation & Education 20 10 200 6 120
Resources
Support Channels 10 10 100 10 100
Easy to understand detection reports 20 10 200 10 200
2. Find the Kali Linux version of NESSUS for 64-bit system and download the .deb package.
3. While the package is downloading, get an activation code from tenable downloads page. It
4. Find the saved package, open a terminal and run dpkg -i (package file name)
dpkg -i Nessus-8.9.0-debian6_amd64.deb
5. After installation completes, use the printed command to start the scanner
/etc/init.d/nessusd start
6. Open firefox, navigate to https://localhost:8834/ accept the self-signed SSL certificate then
7. Wait for the plugins to download and compile. When it completes, login and click new scan
8. Select Advanced scan, and in the Targets text area, enter the IP address of the host to scan.
In my case I selected the Metasploitable2 box running on the local network. Hit the down
The installation is on my Surface Book 2 with Windows 10 Pro. I use different tools for
work and I think I ran into a conflict with virtual box so I ended up installing Kali Linux on
metasploitable-hyper-v-windows-10/
Part 1: Setup
Network Setup
Hyper-V does not have a cool DHCP Network Switch like VirtualBox. Each virtual
machine will use static IPs. Follow steps below to configure a switch that will not be connected
the external network the host is connected to but still be able to connect to the other VMs and
host OS. Open a PowerShell console with elevated privileges and enter the commands from the
following steps:
3. Configure the network private address range for the virtual machines named
“VMNatNetwork”.
Kali Linux
Steps:
1. Download Hyper-V image from https://www.kali.org/downloads/ and extract the zip to a
folder.
2. Open Hyper-V Manager and select Import Virtual Machine.
3. In the Locate Folder section, choose the folder just extracted and select Next.
4. Select the virtual machine and hit Next.
5. In the import type section, choose Register option and select next.
6. Select the destination folders, select Next, select folder for VHD and select Next, then
Finish to create the new Kali Linux VM.
7. In Hyper-V Manager select the Kali Linux VM and select Settings.
8. Select Network Adapter from hardware list on the left and select Remove.
9. Select Add Hardware from the top of the hardware list on the left and select Legacy
Network Adapter then select Add.
10. In the Virtual Switch dropdown menu, select VMSwitch created in the Setup section,
select OK.
11. Start the Kali Linux VM and connect, default username: root, default password: toor
12. Open Network Connections (right click on square icon at top right then select Edit
Connections).
13. Select Wired connection 1 and click the edit (gear icon) at the bottom.
14. Go to IPv4 Settings tab. Select Manual option in the Method dropdown select box.
15. Under addresses, enter 192.168.10.10, Netmask 24, Gateway 192.168.10.1, DNS servers:
8.8.8.8
16. To test, open a terminal and enter ping google.com. Use CTRL + C to stop pinging.
Metasploitable 2
I had to take a few extra steps to get Metasploitable2 to work with Hyper-V.
{PATH_TO}\Metasploitable2\Metasploitable.vmdk"
-DestinationLiteralPath "C:\{PATH_TO\Hyper-V}\Metasploitable2\"
4. Open Hyper-V Manager and select New, Virtual Machine then select Next.
5. Enter Name and change folder location if desired and select Next.
6. Keep Generation 1 option selected and select Next.
7. Enter 512 into startup memory and uncheck dynamic memory, select Next.
8. Select VMSwitch, will change later. Select Next.
9. Virtal Hard Disk, select “Use an existing virtual hard disk” option, find the vhdx file
created in step 3. Select Finish.
10. In Hyper-V Manager, select the Metasploitable2 VM and select Settings.
11. Select Network Adapter from hardware list on the left and select Remove.
12. Select Add Hardware from the top of the hardware list on the left and select Legacy
Network Adapter then select Add.
13. In the Virtual Switch dropdown menu, select VMSwitch created in the Setup section,
select OK.
14. In Hyper-V Manager, select the Metasploitable 2 VM and select Start, then Connect.
15. Default login and password is msfadmin
16. Configure network settings
sudo nano /etc/network/interfaces
to
auto eth0
iface eth0 inet static
address 192.168.10.11
netmask 255.255.255.0
network 192.168.10.0
broadcast 192.168.10.255
gateway 192.168.10.1
dns-nameservers 8.8.8.8
20. Attempt to ping Kali Linux VM (with Kali Linux machine started).
ping 192.168.10.10
WebGoat
1. Open Hyper-V Manager and select Quick Create from the Actions menu on the right.
2. Select Ubuntu 19.04, then More Options.
FINAL ASSIGNMENT 11
3. Select VMSwitch from the Network dropdown select, then select Create Virtual
Machine.
4. After install, go to Hyper-V Manager and select the Ubuntu 19.04 Virtual Machine,
then select Settings.
5. Go to Memory option from the hardware list on the left. Change ram to 4096 then
select OK.
6. From Hyper-V Manager, start Ubuntu 19.04 and connect.
7. Finish first-time configuration.
8. Right click on the Network icon on the top right and select Network Settings, Wired
Settings.
9. Under the Wired option, click the Gear Icon to configure.
10. Under the IPv4 Tab, choose Manual method.
11. Under Addresses enter Address 192.168.10.12, Netmask 255.255.255.0, Gateway
192.168.10.1
12. Under DNS enter 8.8.8.8 and select Apply
13. Test connection to other VMs by opening a terminal and enter ping 192.168.10.10
(Kali), or 192.168.10.11 (Metasploitable).
14. Open a terminal and run the following commands to update the packages, OS and
install Webgoat.
sudo apt-get update
sudo apt-get upgrade
Diagram
This assignment was extremely valuable. I chased my tail a bit since I already had Kali
Linux installed from the foundations course, however when I updated the machine it completely
blew up the operating system and needed to install from scratch. This gave me the opportunity
to configure a network like the assignment required, so following this guide proved to be
instrumental: https://www.techtutsonline.com/setup-kali-linux-metasploitable-hyper-v-
windows-10/
Installing Webgoat was a bit of a red herring as Docker claimed to have an image ready
to go. As I already use docker for some personal projects I decided to give it a shot. This turned
into a big waste of time since I didn’t know how to connect that to the virtual switch. I was
familiar with Ubuntu so getting that installed and working with Webgoat was straight forward.
FINAL ASSIGNMENT 14
Security Toolkit
Throughout the course several tools were in use and others were evaluated and not used.
NMAP – A go-to for information gathering and determining the network’s open ports and
services running on a host. When you know which services and ports are open, you know a little
Wireshark – An essential tool in the security practitioner’s toolkit. This tool analyses network
traffic and can be used to view unencrypted packets. Some helpful information can be gathered
by using wireshark by learning which domains a particular service is in communication with, the
protocols in use.
Kismet – An excellent wireless sniffing tool. View broadcasting devices within range of your
wireless adapter. View packets and device information such as manufacturer, uptime, list of
clients connected to the access point. With the right equipment you can also get GPS information
of your current location to automatically geotag the location of a wireless network, which is
useful for war driving or war walking, depending on your mode of transportation.
Nessus – An excellent tool for scanning hosts for vulnerabilities. They will track common
vulnerabilities on a system and help ensure that your systems are compliant with your update
policies.
Reflection
This course was extremely valuable on many fronts and I have already incorporated a few
tools learned into my day job. Exposure to vulnerability scanners had the biggest impact so far.
My client’s IT staff does not appear to have any sort of tracking mechanism to ensure
compliance with their systems. While at work, network scanning with NMAP has been quite
valuable to find exposed ports and services on our range of public IP’s, several my IT
department was unaware of. The tools available with Metasploit framework and the opportunity
to try exploits on the metasploitable2 and webgoat tools is an excellent way to learn. I plan on
continuing to learn those tools so I can better understand vulnerabilities with the systems I am
developing. Wireless attacks is another thing that greatly interests me but I did not go into great