University Computer Network Vulnerabilit
University Computer Network Vulnerabilit
Volume
Kismat Chhillar et al., International Journal of Advanced 10,inNo.6,
Trends November
Computer - December
Science and 2021 November - December 2021, 3084 – 3090
Engineering, 10(6),
International Journal of Advanced Trends in Computer Science and Engineering
Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse021062021.pdf
https://doi.org/10.30534/ijatcse/2021/021062021
Received Date : October 07, 2021 Accepted Date : November 04, 2021 Published Date : December 06, 2021
3084
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090
efficient implementation of a VMP. The main objective of a security of network. Vulnerability Assessment is a broader
VMP is timely detection and remediation of vulnerabilities. concept as compared to Vulnerability scanning. The
Vulnerability scanning needs to be performed on regular basis vulnerability assessment process is conducted in a stepwise
to know the state of network and keep a check on manner. The steps are asset discovery and classification of
vulnerabilities. Timely scanning of network for vulnerabilities assets, vulnerability scanning, vulnerability analysis,
is a must to keep the network robust and to ensure Prioritization of vulnerabilities, remediation of vulnerabilities
confidentiality, integrity and authenticity of network data. and finally verification of vulnerabilities whether they are
fixed properly or not.
The various phases of a VMP are as follows
2.3 Network Scanning Tools
• Discovery of Network Assets
• Categorization of Network Assets Network scanning tools are of different types. There are tools
• Scanning of Network for Vulnerabilities for network mapping which are used for information
• Report Generation gathering of network. Network mapping includes Port
• Analyzing Scan results scanning, Operating System and Services fingerprinting.
• Prioritize remediation’s of Vulnerabilities Nmap and Zenmap are very efficient tools that can be used for
• Remediate the Vulnerabilities network mapping. For Current work, Nmap has been used for
• Verification and monitoring of Network Security information gathering of network. Zenmap is similar to Nmap
but it is GUI version of Nmap. The operating system used for
implementation of Nmap is Kali Linux. The vulnerability
A VMP is cyclic in nature and above steps are repeated at
scanning tools are used to scan network for vulnerability
regular intervals to ensure security and robustness of network. detection. The vulnerability scanner used for this work is
Phases of a VMP are shown in figure 1. Nexpose.
A. NMAP
Nmap stands for “Network Mapper”. Nmap is a free and
open source tool for discovery of network and auditing of
security [1]. Nmap makes use of raw IP packets to determine
available hosts on the network. It is used for port scanning to
determine open ports on hosts. Nmap also determines the
services (name and version of application) offered by the
available hosts, the operating systems and the OS versions
that are running, the type of firewalls/ packet filters in use.
Nmap is a tool that is flexible, easy, portable, powerful, free,
supported, well documented, acclaimed and popular. Nmap
provides host discovery and detection of services and
operating systems. The use of Nmap scripts provides more
advanced features of vulnerability detection, service detection
and other features. The most important features of Nmap are:
a) Host Discovery
b) Port Scanning
c) Services detection
d) TCP/IP stack fingerprinting
e) Scriptable interaction with hosts
Nmap can also provide information about device types,
MAC addresses etc.”
Figure 1: Phases of a VMP B. Nexpose
2.2 Vulnerability Scanning and Assessment Nexpose is a scanning tool which detects for open ports,
services and running applications. Using the applications and
Vulnerability Scanning is a process of identifying weaknesses services, it tries to detect vulnerabilities that are existing in a
or vulnerabilities in a network. Vulnerability scanning is done network. After scanning, the scan results are disclosed by
with the help of various scanning tools available like Nessus, Nexpose in the form of a report which helps in prioritizing
Nexpose, Qualys, Nmap, Zenmap, OpenVAS etc.The vulnerabilities based on risk factor and an effective solution is
vulnerability scanning steps are vulnerability identification, generated to be implemented [2]. Nexpose is a vulnerability
Analysis of results, risk assessment, remediation and scanning tool by Rapid7. Nexpose community edition is free
implementation. The scanning steps are followed in cyclic to use but with limited number of assets and scan capabilities
manner as they are repeated at regular intervals to ensure and the commercial version is paid. For this work, we have
3085
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090
used Nexpose community edition. The entire VM Lifecycle is Patil et. al [9] discussed about the importance of ethical
supported by Nexpose including discovery of assets, detection hacking to ensure cybersecurity. Shah and Mehtre [10]
of assets, verification, classification of risk, analysis of developed a new tool for vulnerability assessment and
impact, report generation and mitigation of vulnerabilities [3]. penetration testing (VAPT). The name of the tool is
For vulnerability exploitation, Nexpose can be integrated with Net-Nirikshak 1.0 and all the operational and technical
Rapid7’s Matasploit. In Nexpose, user interaction is done aspects of the tool are described by the authors. Based on
through web browser. The login screen after installing and set vulnerability scan, Haifeng Wu in [11] designed a network
up of nexpose can be seen in figure 2. security assessment system. In this system, the detection is on
basis of relational database (RDB) and the method of
assessment is based on fuzzy. Pattanavichai in [12] compared
the scanning tools for network security. Two tools have been
studied namely Microsoft Baseline Security Analyzer
(MBSA) and GFI LanGuard. Mandal and Jadhav [13]
surveyed about open source network security tools.
The terms that are frequently used in Nexpose is as below. Table 1: Subnets Scanned using Nmap
• Asset
• Site Subnet IP Address
• Scan Template 1 172.16.22.1
Asset refers to host in a network and site is a logical group of
2 172.16.6.1
assets having a dedicated scan engine. The audit level used by
Nexpose to perform a vulnerability scan is defined by a scan 3 172.16.3.1
template.
One of the most used and popular Nmap command is PING
3. RELATED WORK
Scan which is used for detection of hosts on any network.
Kumar and Tlhagadikgora [4] in discussed about various tools Figure3, 4&5 shows the execution of Nmap PING Scan on
for vulnerability scanning and exploitation. The authors subnets selected in our work. Three subnets of BU Jhansi
discussed about penetration testing of internal network using were scanned using this command. The commands are nmap
free or open source tools. Nagendramet. al [5] utilized cisco -sp [Target].
packet tracer to evaluate the performance of wide area
network. Aksu et. al [6] evaluated the usability of an open
source vulnerability scanner OpenVAS. They carried out
user-based and expert-based testing. Chalvatzis et. al [7]
provided a framework which is based on virtual machine and
used this framework to evaluate the performance of three
vulnerability scanners on small and medium sized enterprises.
Kumar et. al [8] proposed a system for identification, fixing
and reporting of vulnerabilities of network over Local Area
Network (LAN). The Telnet-SSH connection is automated Figure 3: Nmap Scan of Subnet 1
using Python and is used for vulnerability of physical open
ports.
3086
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090
Ping scan results of subnet1 are shown in figure 3. The Ping subnets are scanned using nmap basic command. Figure6, 7
scan for subnet1 shows that there are 2 hosts up. The subnet is and 8 shows the scan of the targets selected for our work.
172.16.22.1/24 and the hosts that are up are 172.16.22.2 and
172.16.22.156. The subnet1 scanned shown in figure 6 is 172.16.22.1/24 and
there are 2 hosts up.The details of hosts can also be seen in the
output. Port, state and service details of hosts can also be
known using this scan.
The Ping scan for subnet2 in figure 4 shows that there are 3
hosts up. The subnet is 172.16.6.1/24 and the hosts that are up
are 172.16.6.3 and 172.16.6.4 and 172.16.6.11.
3087
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090
entering the details, the site is saved and scanned as per the
schedule or it can also be scanned instantly. Figure 11 shows
the scan template that we selected while creating site. The
scan template that we selected is Full audit without web
spider.
Nmap scan results gave us list of ports that were open, closed
or filtered. Open ports can be misused by the malicious
entities. Filtered ports means they cannot be detected whether
open or closed due to presence of a secure medium like
firewall etc. Through different commands of Nmap we can
Figure 10: Port Scan of Host2 easily determine the status of hosts in a network whether the
hosts are up or not. If the hosts are up, we can determine the
4.2 Vulnerability Scanning using Nexpose Port name, status and services provided. There are several
commands that are used in Nmap to know different details
Three subnets of BU Jhansi were scanned using Nexpose. We about a network. By running commands as per the
need to create a site prior to scan. For site creation there are requirement gives us clear picture of how secure a network is.
some settings which we need to complete. For site creation we By gathering information about a network, network security
need to enter details regarding Info & Security, Alerts, engineers or security personnel can try to remove the pitfalls
Authentication etc. The scan engines, scan templates, scan of a network before it gets exploited by hackers or entities
targets and policies etc. are selected prior to scanning. After with malicious intent.
3088
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090
172.16.22.2 3 1311.6533
172.16.22.1 6 4198.7046
172.16.6.172 6 3560.3647
172.16.6.35 17 7803.292
Figure 13: Vulnerability count of hosts scanned
172.16.6.4 3 1311.6533
The risk score of the hosts scanned is also determined by
172.16.6.3 3 1311.6533 Nexpose scanner. Figure 14 presents the risk score of scanned
hosts. From the scan results, we can determine the hosts which
172.16.6.171 5 3560.3645 are at high risk. Host 172.16.3.33 is at the highest risk. This
host also has the highest number of vulnerabilities. Hence,
172.16.6.210 8 4479.1147 there are high chances that the host having high number of
vulnerabilities is at a high risk of being exploited by the
172.16.6.1 6 4198.7046 malicious entities or hackers.
172.16.6.32 7 4479.1147
172.16.6.201 9 4311.0176
172.16.3.202 6 3099.5347
172.16.3.33 36 18871.068
172.16.3.1 6 4198.7046
172.16.3.211 1 458.06064
172.16.3.212 11 5927.094
3089
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090
network and Nexpose does the actual task of vulnerability 10. S. Shah and B. Mehtre. An automated approach to
scanning. Scanners are crucial tools for effective Vulnerability Assessment and Penetration Testing
Vulnerability Management (VM). The scan results were using Net-Nirikshak 1.0,in IEEE International
analyzed to identify the most vulnerable hosts and on the basis Conference on Advanced Communications, Control and
of scan results, the prioritization and remediation decisions Computing Technologies, 2014.
are taken by the concerned authority. In the future, various doi: 10.1109/ICACCCT.2014.7019182
other Nmap commands can be used for scanning and different 11. H. Wu. Research of Network security Assessment
aspects of Nexpose can be utilized for vulnerability scanning System based on scan, in3rd International Conference
to scan a network more efficiently. on Advanced Computer Control, 2011.
12. S. Pattanavichai. Comparison for network security
scanner tools between GFI LanGuard and Microsoft
ACKNOWLEDGEMENT
Baseline Security Analyzer (MBSA), in15th
International Conference on ICT and Knowledge
I am sincerely thankful to Bundelkhand University Jhansi for
Engineering (ICT&KE), 2017.
assisting me to conduct vulnerability Scanning of UCN. I doi: 10.1109/ICTKE.2017.8259628
thank System Analyst of the university for his complete 13. N. Mandal and S. Jadhav. A survey on network security
support in conducting my scanning task efficiently. tools for open source, in IEEE International Conference
on Current Trends in Advanced Computing (ICCTAC),
REFERENCES 2016.
1. https://nmap.org/. doi: 10.1109/ICCTAC.2016.7567330
2. https://docs.rapid7.com/metasploit/vulnerability-scannin
g-with-nexpose/.
3. https://sectools.org/tool/nexpose/.
4. R. Kumar and K. Tlhagadikgora. Internal Network
Penetration Testing Using Free/Open Source Tools:
Network and System Administration
Approach,Communications in Computer and
Information Science, vol. 956, 2018.
https://doi.org/10.1007/978-981-13-3143-5_22
5. Sanam, Nagendram, P. Sai Anil, E.V.S. Pavan and V.
Amarendra. Performance Evaluation of Wide Area
Network using Cisco Packet Tracer. International
Journal of Advanced Trends in Computer Science and
Engineering (IJATCSE), Vol. 8, Number 6, pp.
2915-2919, 2019.
https://doi.org/10.30534/ijatcse/2019/38862019.
6. M. U. Aksu, E. Altuncu and K. Bicakci. A First Look at
the Usability of OpenVAS Vulnerability Scanner, in
Workshop on Usable Security (USEC 2019), pp. 595-600,
24 February 2019.
http://dx.doi.org/10.14722/usec.2019.23026
7. I. Chalvatzis, D. A. Karras and R. C. Papademetriou.
Evaluation of Security Vulnerability Scanners for
Small and Medium Enterprises Business Networks
Resilience towards Risk Assessment,in IEEE
International Conference on Artificial Intelligence and
Computer Applications (ICAICA), 2019.
http://dx.doi.org/10.1109/ICAICA.2019.8873438
8. B. K. Kumar, N. Raj, J. Dhivvya and D. Muralidharan,
Fixing Network Security Vulnerabilities in Local
Area Network, in 3rd International Conference on
Trends in Electronics and Informatics (ICOEI), 2019.
http://dx.doi.org/10.1109/ICOEI.2019.8862634
9. S. Patil, A. Jangra, M. Bhale, A. Raina and P.
Kulkarni.Ethical hacking: The need for cyber
security,in IEEE International Conference on Power,
Control, Signals and Instrumentation Engineering
(ICPCSI 2017), 2017.
doi: 10.1109/ICPCSI.2017.8391982
3090