Skip to content

iamprinceefe/Vulnerability-Management-Lab-Metasploit-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 

Repository files navigation

Vulnerability Management (Nmap)

Description

This repository provides a detailed guide on using Nmap solely for vulnerability scanning and setting up firewall configuration to enhance security. The project involves setting up a series of virtual machines on VMWare Workstation to create a realistic testing environment for identifying and mitigating network vulnerabilities.

Utilities Used

  • Nmap
  • Metasploit
  • UFW Firewall

Environments Used

  • VirtualBox
  • Ubuntu

Program walk-through:

Made sure my Virtualbox was installed, configured and ready:
Disk Sanitization Steps

Downloaded the Metasploit 2 Zip file:
Disk Sanitization Steps

Unzipped the File and installed "Metasploitable.vmdk" in my Virtualbox:
Disk Sanitization Steps Disk Sanitization Steps

Launched Metasploit and login with the default password:
Disk Sanitization Steps

Confirmed the ip address as my target:
Disk Sanitization Steps

Also confirmed Metasploit performance on web:
Disk Sanitization Steps

Sent a ping request from my Ubuntu to Metasploit:
Disk Sanitization Steps
Conducted a scan of all TCP ports on the host using the -sT parameter in Nmap:
Disk Sanitization Steps
Also conducted a scan of all UDP ports on the host using the -sU parameter in Nmap:
Disk Sanitization Steps
As the Metasploit machine is intentionally designed to be vulnerable, my ability to directly address the vulnerabilities or open ports found on the host was restricted. Therefore, I opted to install and enable a firewall as a proactive measure to mitigate these issues:
Disk Sanitization Steps
I implemented a firewall configuration to deny all TCP connections deemed at risk, effectively enhancing the security posture of the system:
Disk Sanitization Steps
I extended the firewall configuration to deny all UDP connections identified as potentially risky, further bolstering the security measures of the system.:
Disk Sanitization Steps

Result:

:

Disk Sanitization Steps


Disk Sanitization Steps


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published