0% found this document useful (0 votes)
37 views7 pages

University Computer Network Vulnerabilit

The document discusses vulnerability management in university computer networks. It focuses on implementing vulnerability scanning tools like Nmap and Nexpose to identify vulnerabilities. The results are analyzed to prioritize remediating vulnerabilities. An effective vulnerability management process is important to regularly check for new vulnerabilities and provide solutions to resolve them securely. This helps prevent cybersecurity breaches in university networks.

Uploaded by

Putri Santika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views7 pages

University Computer Network Vulnerabilit

The document discusses vulnerability management in university computer networks. It focuses on implementing vulnerability scanning tools like Nmap and Nexpose to identify vulnerabilities. The results are analyzed to prioritize remediating vulnerabilities. An effective vulnerability management process is important to regularly check for new vulnerabilities and provide solutions to resolve them securely. This helps prevent cybersecurity breaches in university networks.

Uploaded by

Putri Santika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

ISSN 2278-3091

Volume
Kismat Chhillar et al., International Journal of Advanced 10,inNo.6,
Trends November
Computer - December
Science and 2021 November - December 2021, 3084 – 3090
Engineering, 10(6),
International Journal of Advanced Trends in Computer Science and Engineering
Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse021062021.pdf
https://doi.org/10.30534/ijatcse/2021/021062021

University Computer Network Vulnerability Management


using Nmap and Nexpose
Kismat Chhillar1, Saurabh Shrivastava2
1
Bundelkhand University,Jhansi, India, [email protected]
2
Bundelkhand University, Jhansi, India, [email protected]

Received Date : October 07, 2021 Accepted Date : November 04, 2021 Published Date : December 06, 2021

 vulnerability scanners. Such scanners are designed to assess


ABSTRACT networks, applications and computers for known
vulnerabilities. The vulnerabilities of a network can arise from
Over the past few years, the advancement of technology in flawed programming or misconfigurations within an asset like
universities have led to rise in the number of vulnerabilities in router, firewall, application server, web server etc.
University computer Network (UCN). To ensure robustness Vulnerability remediation’s may include change in security
and hardness of UCN, an efficient Vulnerability Management policy of network, patch installation, educating users about
System is required. The focus of current work is on the network security and software reconfiguration.
importance of vulnerability management in a UCN. A
plethora of tools are used for vulnerability scanning and Network VM identifies vulnerabilities in a network and also
assessment. This paper also focuses on the implementation of evaluates the risk associated with these vulnerabilities. This
vulnerability scanning tools on UCN. Assessment of scan evaluation further helps in mitigation or remediation of
results is done to identify vulnerabilities in the network that vulnerabilities. More is the risk associated with a
need to be resolved on priority basis. Based on the scan results vulnerability, sooner it needs to be remediated. VM is a
obtained after scanning the network using scanning tools, the
broader term as compared to vulnerability scanning. Apart
decision can be taken to mitigate the vulnerabilities on
from vulnerability scanning, VM considers other aspects as
priority basis. Vulnerability Management in a UCN is a
well like Risk assessment, remediation of vulnerabilities etc.
stepwise procedure that needs to be implemented to keep the
network secure. An effective VM framework is important and
inevitable to prevent cyber security breaches in a UCN as it The rest of the paper is organized as follows. Section 2 deals
regularly checks for new vulnerabilities on and also provide with important concepts like vulnerability management
solutions to remediate or resolve the vulnerabilities. The process, Vulnerability Scanning and Scanning tools. Section 3
scanning tools used for the current work were Nmap and discusses about related work that has already been done by
Nexpose. Nmap was used for information gathering of various researchers. Section 4 discusses about implementation
network and Nexpose was used for scanning the network for of vulnerability management and scanning of a University
vulnerability detection. Computer Network (UCN). The implementation of
vulnerability scanning tools has been done on Bundelkhand
Key words: Network Security, Network Vulnerability University (Jhansi, India) Computer Network. Section 5
Assessment, Network Vulnerability Management, presents scan result analysis and remediation’s of
Vulnerability Scanning, University Computer Network. vulnerabilities based on VM process. Section 6 discusses
about conclusion and future scope of this research.
1. INTRODUCTION
2. IMPORTANT CONCEPTS
To ensure network security, an efficient Vulnerability
Management Framework (VMF) has become the need of the 2.1 Vulnerability Management Process (VMP)
hour. The vulnerabilities in a UCN is increasing at a rapid rate
which needs to be remediated efficiently and effectively. To ensure network security in a University Computer
Network Vulnerability Management (VM) is a cyclic process Network (UCN), a proper and effective Vulnerability
that deals with identification, classification, prioritization, Management Process (VMP) has become inevitable.
remediation and mitigation of vulnerabilities in a network. Vulnerabilities are increasing day by day and being large in
Current paper deals with Vulnerabilities in a UCN. number, it is not possible to deal with vulnerabilities
Vulnerabilities are detected and identified by using manually. This demands for a stepwise and well-planned
management of vulnerabilities. All this can be achieved by an

3084
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090

efficient implementation of a VMP. The main objective of a security of network. Vulnerability Assessment is a broader
VMP is timely detection and remediation of vulnerabilities. concept as compared to Vulnerability scanning. The
Vulnerability scanning needs to be performed on regular basis vulnerability assessment process is conducted in a stepwise
to know the state of network and keep a check on manner. The steps are asset discovery and classification of
vulnerabilities. Timely scanning of network for vulnerabilities assets, vulnerability scanning, vulnerability analysis,
is a must to keep the network robust and to ensure Prioritization of vulnerabilities, remediation of vulnerabilities
confidentiality, integrity and authenticity of network data. and finally verification of vulnerabilities whether they are
fixed properly or not.
The various phases of a VMP are as follows
2.3 Network Scanning Tools
• Discovery of Network Assets
• Categorization of Network Assets Network scanning tools are of different types. There are tools
• Scanning of Network for Vulnerabilities for network mapping which are used for information
• Report Generation gathering of network. Network mapping includes Port
• Analyzing Scan results scanning, Operating System and Services fingerprinting.
• Prioritize remediation’s of Vulnerabilities Nmap and Zenmap are very efficient tools that can be used for
• Remediate the Vulnerabilities network mapping. For Current work, Nmap has been used for
• Verification and monitoring of Network Security information gathering of network. Zenmap is similar to Nmap
but it is GUI version of Nmap. The operating system used for
implementation of Nmap is Kali Linux. The vulnerability
A VMP is cyclic in nature and above steps are repeated at
scanning tools are used to scan network for vulnerability
regular intervals to ensure security and robustness of network. detection. The vulnerability scanner used for this work is
Phases of a VMP are shown in figure 1. Nexpose.
A. NMAP
Nmap stands for “Network Mapper”. Nmap is a free and
open source tool for discovery of network and auditing of
security [1]. Nmap makes use of raw IP packets to determine
available hosts on the network. It is used for port scanning to
determine open ports on hosts. Nmap also determines the
services (name and version of application) offered by the
available hosts, the operating systems and the OS versions
that are running, the type of firewalls/ packet filters in use.
Nmap is a tool that is flexible, easy, portable, powerful, free,
supported, well documented, acclaimed and popular. Nmap
provides host discovery and detection of services and
operating systems. The use of Nmap scripts provides more
advanced features of vulnerability detection, service detection
and other features. The most important features of Nmap are:
a) Host Discovery
b) Port Scanning
c) Services detection
d) TCP/IP stack fingerprinting
e) Scriptable interaction with hosts
Nmap can also provide information about device types,
MAC addresses etc.”
Figure 1: Phases of a VMP B. Nexpose
2.2 Vulnerability Scanning and Assessment Nexpose is a scanning tool which detects for open ports,
services and running applications. Using the applications and
Vulnerability Scanning is a process of identifying weaknesses services, it tries to detect vulnerabilities that are existing in a
or vulnerabilities in a network. Vulnerability scanning is done network. After scanning, the scan results are disclosed by
with the help of various scanning tools available like Nessus, Nexpose in the form of a report which helps in prioritizing
Nexpose, Qualys, Nmap, Zenmap, OpenVAS etc.The vulnerabilities based on risk factor and an effective solution is
vulnerability scanning steps are vulnerability identification, generated to be implemented [2]. Nexpose is a vulnerability
Analysis of results, risk assessment, remediation and scanning tool by Rapid7. Nexpose community edition is free
implementation. The scanning steps are followed in cyclic to use but with limited number of assets and scan capabilities
manner as they are repeated at regular intervals to ensure and the commercial version is paid. For this work, we have

3085
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090

used Nexpose community edition. The entire VM Lifecycle is Patil et. al [9] discussed about the importance of ethical
supported by Nexpose including discovery of assets, detection hacking to ensure cybersecurity. Shah and Mehtre [10]
of assets, verification, classification of risk, analysis of developed a new tool for vulnerability assessment and
impact, report generation and mitigation of vulnerabilities [3]. penetration testing (VAPT). The name of the tool is
For vulnerability exploitation, Nexpose can be integrated with Net-Nirikshak 1.0 and all the operational and technical
Rapid7’s Matasploit. In Nexpose, user interaction is done aspects of the tool are described by the authors. Based on
through web browser. The login screen after installing and set vulnerability scan, Haifeng Wu in [11] designed a network
up of nexpose can be seen in figure 2. security assessment system. In this system, the detection is on
basis of relational database (RDB) and the method of
assessment is based on fuzzy. Pattanavichai in [12] compared
the scanning tools for network security. Two tools have been
studied namely Microsoft Baseline Security Analyzer
(MBSA) and GFI LanGuard. Mandal and Jadhav [13]
surveyed about open source network security tools.

4. NETWORK VULNERABILITY SCANNING USING


NMAP AND NEXPOSE

4.1Network Information Gathering using Nmap

The implementation of Nmap is done on a few subnets of


Bundelkhand University, Jhansi, India. Six subnets were
scanned using Nmap. The operating system used for scanning
using Nmap is Kali Linux. Kali Linux is an effective and very
popular operating system as far as vulnerability scanning and
Penetration testing is concerned. Three subnets of
Bundelkhand University (BU) Jhansi have been scanned
using Nmap. The subnets that were scanned are listed in Table
Figure 2: Nexpose Login Screen 1.

The terms that are frequently used in Nexpose is as below. Table 1: Subnets Scanned using Nmap
• Asset
• Site Subnet IP Address
• Scan Template 1 172.16.22.1
Asset refers to host in a network and site is a logical group of
2 172.16.6.1
assets having a dedicated scan engine. The audit level used by
Nexpose to perform a vulnerability scan is defined by a scan 3 172.16.3.1
template.
One of the most used and popular Nmap command is PING
3. RELATED WORK
Scan which is used for detection of hosts on any network.
Kumar and Tlhagadikgora [4] in discussed about various tools Figure3, 4&5 shows the execution of Nmap PING Scan on
for vulnerability scanning and exploitation. The authors subnets selected in our work. Three subnets of BU Jhansi
discussed about penetration testing of internal network using were scanned using this command. The commands are nmap
free or open source tools. Nagendramet. al [5] utilized cisco -sp [Target].
packet tracer to evaluate the performance of wide area
network. Aksu et. al [6] evaluated the usability of an open
source vulnerability scanner OpenVAS. They carried out
user-based and expert-based testing. Chalvatzis et. al [7]
provided a framework which is based on virtual machine and
used this framework to evaluate the performance of three
vulnerability scanners on small and medium sized enterprises.
Kumar et. al [8] proposed a system for identification, fixing
and reporting of vulnerabilities of network over Local Area
Network (LAN). The Telnet-SSH connection is automated Figure 3: Nmap Scan of Subnet 1
using Python and is used for vulnerability of physical open
ports.
3086
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090

Ping scan results of subnet1 are shown in figure 3. The Ping subnets are scanned using nmap basic command. Figure6, 7
scan for subnet1 shows that there are 2 hosts up. The subnet is and 8 shows the scan of the targets selected for our work.
172.16.22.1/24 and the hosts that are up are 172.16.22.2 and
172.16.22.156. The subnet1 scanned shown in figure 6 is 172.16.22.1/24 and
there are 2 hosts up.The details of hosts can also be seen in the
output. Port, state and service details of hosts can also be
known using this scan.

Figure 4: Nmap Scan of Subnet 2

The Ping scan for subnet2 in figure 4 shows that there are 3
hosts up. The subnet is 172.16.6.1/24 and the hosts that are up
are 172.16.6.3 and 172.16.6.4 and 172.16.6.11.

Figure 7: Scan subnet2 using nmap command


Figure7. Shows scan results for subnet 2. Details of each
individual host that is up is depicted in the scan output.
Subnet2 is 172.16.6.1/24. The host 172.16.6.3, the open ports
are port 23 and 80 and the services provided are telnet and http
respectively. For host 172.16.6.11, the open ports are 80 and
554 and the services are http and rtsp respectively. Host detail
of other subnets can also be seen in similar manner.
Figure 5: Nmap Scan of Subnet 3
Fig 8a and 8b shows scan output of subnet3. There are 6 hosts
which are up and details about port, state and service of each
The Ping scan for subnet3 in figure 5 shows that there are 6
host is clearly mentioned in the scan output.
hosts up. The subnet is 172.16.3.1/24 and the hosts that are up
are 172.16.3.2, 172.16.3.33, 172.16.3.98, 172.16.3.204,
172.16.3.205 and 172.16.3.207.

Figure 6: Scan subnet1 using nmap command

Nmap scan of targets give more details as compared to ping


scan. The syntax for Nmap command is nmap [Target]. The Figure 8(a): Scan subnet3 using nmap command

3087
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090

entering the details, the site is saved and scanned as per the
schedule or it can also be scanned instantly. Figure 11 shows
the scan template that we selected while creating site. The
scan template that we selected is Full audit without web
spider.

Figure 8(b): Scan subnet3 using nmap command


Port scanning of top 10 ports of a host can be done using the Figure 11: Selecting Scan Template
command: nmap -top-ports 10 [Target]. Port Scan of two
hosts have beed done. The scan outputs of host1 and host2 are Figure 12 shows the screenshot of the scan engine that we
depicted in figure9 and 10 respectively. selected while creating a site. The scan engine that we
selected for scanning is Local Scan Engine.

Figure 12: Selecting Scan Engine

5. SCAN RESULT ANALYSIS


Figure 9: Port Scan of Host1
From scan results of Nmap and Nexpose, we clearly get an
idea about the current state of network that we scanned. Nmap
provides information about a network like host details, port
details, state of port and services provided etc. Nexpose scan
results exposes vulnerabilities present in a network.

Nmap scan results gave us list of ports that were open, closed
or filtered. Open ports can be misused by the malicious
entities. Filtered ports means they cannot be detected whether
open or closed due to presence of a secure medium like
firewall etc. Through different commands of Nmap we can
Figure 10: Port Scan of Host2 easily determine the status of hosts in a network whether the
hosts are up or not. If the hosts are up, we can determine the
4.2 Vulnerability Scanning using Nexpose Port name, status and services provided. There are several
commands that are used in Nmap to know different details
Three subnets of BU Jhansi were scanned using Nexpose. We about a network. By running commands as per the
need to create a site prior to scan. For site creation there are requirement gives us clear picture of how secure a network is.
some settings which we need to complete. For site creation we By gathering information about a network, network security
need to enter details regarding Info & Security, Alerts, engineers or security personnel can try to remove the pitfalls
Authentication etc. The scan engines, scan templates, scan of a network before it gets exploited by hackers or entities
targets and policies etc. are selected prior to scanning. After with malicious intent.

3088
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090

Nexpose scan results provides the vulnerabilities present in


the scanned network. Table 2 shows IP address, Number of
vulnerabilities detected and risk score of the hosts scanned.

Table 2: Nexpose Scan Result of Hosts

Address Vulnerabilities Risk Score

172.16.22.2 3 1311.6533

172.16.22.1 6 4198.7046

172.16.6.172 6 3560.3647

172.16.6.35 17 7803.292
Figure 13: Vulnerability count of hosts scanned
172.16.6.4 3 1311.6533
The risk score of the hosts scanned is also determined by
172.16.6.3 3 1311.6533 Nexpose scanner. Figure 14 presents the risk score of scanned
hosts. From the scan results, we can determine the hosts which
172.16.6.171 5 3560.3645 are at high risk. Host 172.16.3.33 is at the highest risk. This
host also has the highest number of vulnerabilities. Hence,
172.16.6.210 8 4479.1147 there are high chances that the host having high number of
vulnerabilities is at a high risk of being exploited by the
172.16.6.1 6 4198.7046 malicious entities or hackers.

172.16.6.32 7 4479.1147

172.16.6.201 9 4311.0176

172.16.3.202 6 3099.5347

172.16.3.33 36 18871.068

172.16.3.1 6 4198.7046

172.16.3.211 1 458.06064

172.16.3.212 11 5927.094

172.16.3.2 3 1311.6533 Figure 14: Risk Score of hosts scanned

172.16.3.207 2 1168.7344 Based on the number of vulnerabilities and risk score of a


host, remediations can be taken on priority basis. The hosts
172.16.3.205 2 1168.7344 which are at high risk and is highly vulnerable to attacks need
to be dealt first. Various other details can also be retrieved
172.16.3.204 2 1168.7344 from Nexpose scan like CVSS score of vulnerabilities,
Operating system detected, malwares etc. This gives a clear
picture of how robust and secure is the network.
Figure 13 represents the count of vulnerabilities present in the
hosts scanned by Nexpose scanner. From the scan result we 6. CONCLUSION AND FUTURE WORK
can determine the host with the greatest number of
vulnerabilities. The host 172.16.3.33 has the highest number Vulnerability scanning of a University Computer Network
of vulnerabilities i: e 36. The host 172.16.6.35 and (UCN) have been performed using two very popular and
172.16.3.212 are also highly vulnerable having vulnerability efficient scanning tools namely Nmap and Nexpose. Nmap is
count as 17 and 11 respectively. a network mapper used for gathering information about a

3089
Kismat Chhillar et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(6), November - December 2021, 3084 – 3090

network and Nexpose does the actual task of vulnerability 10. S. Shah and B. Mehtre. An automated approach to
scanning. Scanners are crucial tools for effective Vulnerability Assessment and Penetration Testing
Vulnerability Management (VM). The scan results were using Net-Nirikshak 1.0,in IEEE International
analyzed to identify the most vulnerable hosts and on the basis Conference on Advanced Communications, Control and
of scan results, the prioritization and remediation decisions Computing Technologies, 2014.
are taken by the concerned authority. In the future, various doi: 10.1109/ICACCCT.2014.7019182
other Nmap commands can be used for scanning and different 11. H. Wu. Research of Network security Assessment
aspects of Nexpose can be utilized for vulnerability scanning System based on scan, in3rd International Conference
to scan a network more efficiently. on Advanced Computer Control, 2011.
12. S. Pattanavichai. Comparison for network security
scanner tools between GFI LanGuard and Microsoft
ACKNOWLEDGEMENT
Baseline Security Analyzer (MBSA), in15th
International Conference on ICT and Knowledge
I am sincerely thankful to Bundelkhand University Jhansi for
Engineering (ICT&KE), 2017.
assisting me to conduct vulnerability Scanning of UCN. I doi: 10.1109/ICTKE.2017.8259628
thank System Analyst of the university for his complete 13. N. Mandal and S. Jadhav. A survey on network security
support in conducting my scanning task efficiently. tools for open source, in IEEE International Conference
on Current Trends in Advanced Computing (ICCTAC),
REFERENCES 2016.
1. https://nmap.org/. doi: 10.1109/ICCTAC.2016.7567330
2. https://docs.rapid7.com/metasploit/vulnerability-scannin
g-with-nexpose/.
3. https://sectools.org/tool/nexpose/.
4. R. Kumar and K. Tlhagadikgora. Internal Network
Penetration Testing Using Free/Open Source Tools:
Network and System Administration
Approach,Communications in Computer and
Information Science, vol. 956, 2018.
https://doi.org/10.1007/978-981-13-3143-5_22
5. Sanam, Nagendram, P. Sai Anil, E.V.S. Pavan and V.
Amarendra. Performance Evaluation of Wide Area
Network using Cisco Packet Tracer. International
Journal of Advanced Trends in Computer Science and
Engineering (IJATCSE), Vol. 8, Number 6, pp.
2915-2919, 2019.
https://doi.org/10.30534/ijatcse/2019/38862019.
6. M. U. Aksu, E. Altuncu and K. Bicakci. A First Look at
the Usability of OpenVAS Vulnerability Scanner, in
Workshop on Usable Security (USEC 2019), pp. 595-600,
24 February 2019.
http://dx.doi.org/10.14722/usec.2019.23026
7. I. Chalvatzis, D. A. Karras and R. C. Papademetriou.
Evaluation of Security Vulnerability Scanners for
Small and Medium Enterprises Business Networks
Resilience towards Risk Assessment,in IEEE
International Conference on Artificial Intelligence and
Computer Applications (ICAICA), 2019.
http://dx.doi.org/10.1109/ICAICA.2019.8873438
8. B. K. Kumar, N. Raj, J. Dhivvya and D. Muralidharan,
Fixing Network Security Vulnerabilities in Local
Area Network, in 3rd International Conference on
Trends in Electronics and Informatics (ICOEI), 2019.
http://dx.doi.org/10.1109/ICOEI.2019.8862634
9. S. Patil, A. Jangra, M. Bhale, A. Raina and P.
Kulkarni.Ethical hacking: The need for cyber
security,in IEEE International Conference on Power,
Control, Signals and Instrumentation Engineering
(ICPCSI 2017), 2017.
doi: 10.1109/ICPCSI.2017.8391982

3090

You might also like