Career
Vulnerability Management Lab with OpenVAS
Company: Internship Program
Project Overview
In this project, I established a secure Azure network and deployed two virtual machines configured to run OpenVAS Vulnerability Management Scanner and Windows 10. To create a deliberately vulnerable environment, the Windows 10 virtual machine was intentionally exposed by disabling security controls and installing outdated software. In order to emphasize the importance of proper vulnerability scan configurations, I conducted both unauthenticated and credentialed scans. Two scans were conducted on the Windows 10 machine. The first one was unauthenticated, and once it finished, the second, which was credentialed, was initiated. Remediations were implemented based on the results of the credentialed scan to address major vulnerabilities, followed by a final credentialed scan to validate the effectiveness of the applied fixes.Technologies Used
- Azure Virtual Network
- OpenVAS Vulnerability Management Scanner
- Windows 10 Pro virtual machine
- Outdated software known to have vulnerabilities
- Mozilla Firefox v97.0b5
- VideoLAN VLC Media Player v1.1.7
- Adobe Reader v10.0.0
Deploy Resources and Configure Virtual Machines for an Unauthenticated Scan
The initial step involved creating the OpenVAS Vulnerability Management Scanner, specifically using OpenVas by HOSSTED with a default developer configuration. Concurrently, a Windows 10 Pro virtual machine was set up. This VM's firewall was disabled and outdated versions of Firefox, VLC Media Player, and Adobe Reader were installed. The goal was for the Windows 10 machine to be vulnerable. Once the firewall was disabled and the vulnerable software was installed, the machine was restarted. To configure OpenVAS for an unauthenticated scan:- A new host was created by using the Windows 10 virtual machine’s private IP Address.
- A new target was created using the host from the previous step. All other configurations were left as default, and no credentials were provided to OpenVAS.
- A new task was created with the target from the previous step. Again, all other configurations were left as default.
Unauthenticated Scan Results
Given the limitations of unauthenticated scans, the vulnerabilities identified did not accurately represent those in the outdated software. The unauthenticated scan results did not fully capture the vulnerabilities in the deliberately exposed virtual machine.Credentialed Scan Configurations for Windows 10 Machine
Several adjustments were made to prepare the Windows 10 machine for a credentialed scan. The first being verifying and modifying the Windows Firewall profiles which had already been completed in the initial configuration. The following steps were then completed:- Disabling User Account Control.
- Enabling Remote Registry.
- Navigate to the Windows Registry and create a new DWORD named “LocalAccountTokenFilterPolicy” and set the value to “1”.
- Finally, restart the VM.
OpenVAS Configurations for a Credentialed Scan
While the Windows 10 machine restarted, OpenVAS was configured for a credentialed scan using the following steps:- Create a new credential using the VM's username and password.
- Clone the existing target by clicking the sheep icon found under “Actions.” Edit the cloned target and enable SMB by selecting the credentials created in the previous step.
- Clone the existing task and edit the clone to use the credentialed target created in the previous step.