Risk Management
Week 4 Lab
Vulnerability
Scanners
Imagine a system administrator
learns of a server’s vulnerability, and a service patch is available to solve
it. Unfortunately, simply applying a patch to a server is not assurance enough
that a risk has been mitigated. The system admin has the option of opening the
application and verifying that the patch has raised the version number as
expected. Still, the admin has no guarantee the vulnerability is closed, at
least not until the vulnerability is directly tested. That’s what vulnerability
scanners are for.
Two vulnerability scanners
available to the system administrator are Nmap® and
Nessus®, which produce scan reports. The purpose of using Zenmap®
GUI (Nmap) and Nessus® reports is to enable you to
create network discovery port scanning reports and vulnerability reports. These
reports can identify the hosts, operating systems, services, applications, and
open ports that are at risk in an organization.
In this lab, you will look at
an Nmap® report and a Nessus® report. You will visit
the http://cve.mitre.org Web site, you will define vulnerability and exposure
according to the site, and you will learn how to conduct searches of the Common
Vulnerabilities and Exposures (CVE) listing.
Learning
Objectives
Upon completing this lab, you
will be able to:
Review a Zenmap®
GUI (Nmap) network discovery and port scanning report
and a Nessus® software vulnerability report.
Identify hosts, operating
systems, services, applications, and open ports on devices from the Zenmap® GUI (Nmap) scan report.
Identify critical, major, and
minor software vulnerabilities from the Nessus® vulnerability assessment scan
report.
Visit the Common
Vulnerabilities and Exposures (CVE) online listing of software vulnerabilities
at http://cve.mitre.org and learn how to conduct searches on the site.
Deliverables
Upon completion of this lab,
you are required to provide the following deliverables to your instructor:
1. Lab Report file;
2. Lab Assessments file.
Evaluation
Criteria and Rubrics
The following are the
evaluation criteria for this lab that students must perform:
1. Review a Zenmap® GUI (Nmap) network discovery and port scanning report and a
Nessus® software vulnerability report. – [25%]
2. Identify hosts, operating systems, services, applications, and
open ports on devices from the Zenmap® GUI (Nmap) scan report. – [25%]
3. Identify critical, major, and minor software vulnerabilities
from the Nessus® vulnerability assessment scan report. – [25%]
4. Visit the Common Vulnerabilities and Exposures (CVE) online
listing of software vulnerabilities at http://cve.mitre.org and learn how to
conduct searches on the site. – [25%]