Module 5
Module 5
As a professional ethical hacker or pen tester, your first step is to search for vulnerabilities in the
target system or network using vulnerability scoring systems and databases. Vulnerability
research provides awareness of advanced techniques to identify flaws or loopholes in the
software that could be exploited. Using this information, you can use various tricks and
techniques to launch attacks on the target system.
Lab Objectives
Vulnerability databases collect and maintain information about various vulnerabilities present in
the information systems.
The following are some of the vulnerability scoring systems and databases:
Here, we will use CWE to view the latest underlying system vulnerabilities.
If the Default Browser pop-up window appears, uncheck the Always perform
this check when starting Firefox checkbox and click the Not now button.
If a New in Firefox: Content Blocking pop-up window appears, follow the step
and click start browsing to finish viewing the information.
Here, we are searching for the vulnerabilities of the running services that were
found in the target systems in previous module labs (Module 04 Enumeration).
4. The search results appear, scroll-down to view the underlying vulnerabilities in
the target service (here, SMB). You can click any link to view detailed
information on the vulnerability.
The search results might differ when you perform this task
5. Now, click any link (here, CWE-284) to view detailed information about the
vulnerability.
6. Similarly, you can click on other vulnerabilities and view detailed information.
7. Now, navigate to the CWE List tab. CWE List Version will be displayed.
Scroll down, and under the External Mappings section, select CWE Top 25
(2023).
This information can be used to exploit the vulnerabilities in the software and
further launch attacks.
The result showing publishing year might differ when you perform this task.
9. Similarly, you can go back to the CWE website and explore other options, as
well.
10. Attacker can find vulnerabilities on the services running on the target systems
and further exploit them to launch attacks.
12. Close all open windows and document all the acquired information.
Question 5.1.1.1
Search the Common Weakness Enumeration (CWE) list and find the name of the vulnerability
with the CWE ID 591.
Question 5.1.1.2
Search the Common Weakness Enumeration (CWE) list and find the top weakness in the list
“Weaknesses in the 2023 CWE Top 25 Most Dangerous Software Weakness.”
The information gathered in the previous labs might not be sufficient to reveal potential
vulnerabilities of the target: there could be more information available that may help in finding
loopholes. As an ethical hacker, you should look for as much information as possible using all
available tools. This lab will demonstrate other information that you can extract from the target
using various vulnerability assessment tools.
Lab Objectives
Active Scanning
Passive Scanning
In this task, we will use the Parrot Security (10.10.1.13) machine as a host machine and
the Windows Server 2022 (10.10.1.22) machine as a target machine.
1. Click on Parrot Security to switch to the Parrot Security machine and login
with attacker/toor.
2. Open a Terminal window and execute sudo su to run the programs as a root
user (When prompted, enter the password toor).
4. After the tool initializes, click Firefox icon from the top-section of the Desktop.
If a Warning page appears, click Advanced and select Accept the Risk and
Continue.
6. The OpenVAS Dashboards appears. Navigate to Scans --> Tasks from
the Menu bar.
10. Wait for the Status to change from Requested to Done. Once it is completed,
click the Done button under the Status column to view the vulnerabilities found
in the target system.
15. Next, go through the findings, including all high or critical vulnerabilities.
Manually use your skills to verify the vulnerability. The challenge with
vulnerability scanners is that they are quite limited; they work well for an
internal or white box test only if the credentials are known. We will explore that
now: return to your OpenVAS tool, and set up for the same scan again; but this
time, turn your firewall ON in the Windows Server 2022 machine.
16. Now, we will enable Windows Firewall in the target system and scan it for
vulnerabilities.
17. Click on Windows Server 2022 to switch to the Windows Server 2022 machine
and click Ctrl+Alt+Delete and login with CEH\Administrator / Pa$$w0rd.
18. Navigate to Control Panel --> System and Security --> Windows Defender
Firewall --> Turn Windows Defender Firewall on or off, enable Windows
Firewall, and click OK.
By turning the Firewall ON, you are making it more difficult for the scanning
tool to scan for vulnerabilities in the target system.
20. A newly created task appears under the Tasks section and starts scanning the
target system for vulnerabilities.
21. After the completion of the scan, click the Done button under the Status column.
22. Report: Results appears, displaying the discovered vulnerabilities along with
their severity and port numbers on which they are running.
The results might differ when you perform this task.
23. The scan results for the target machine before and after the Windows Firewall
was enabled are the same, thereby indicating that the target system is vulnerable
to attack even if the Firewall is enabled.
25. Close all open windows and document all the acquired information.
26. Click on Windows Server 2022 to switch to the Windows Server 2022 machine
and click Ctrl+Alt+Delete login with Administrator/Pa$$w0rd.
27. Navigate to Control Panel --> System and Security --> Windows Defender
Firewall --> Turn Windows Defender Firewall on or off, disable Windows
Firewall, and click OK.
Question 5.2.1.1
Perform vulnerability analysis for the target machine (10.10.1.22) using OpenVAS and find the
number of vulnerabilities in the system. Enter the Severiety level of the DCE/RPC and MSRPC
Services Enumeration Reporting vulnerability.
As a professional ethical hacker or pen tester, you must acknowledge the limitations of
conventional approaches in revealing all potential vulnerabilities. Therefore, you will utilize AI-
driven vulnerability analysis tools to identify and assess security weaknesses in a simulated
network environment.
Lab Objectives
Vulnerability Analysis with AI employs advanced algorithms to unearth hidden security flaws in
networks. AI-driven tools extract comprehensive data, prioritize risks, and fortify defenses,
empowering ethical hackers to anticipate and mitigate emerging threats effectively. This
innovative approach enhances cybersecurity readiness by leveraging AI's precision and
adaptability.
The commands generated by ShellGPT may vary depending on the prompt used and the tools
available on the machine. Due to these variables, the output generated by ShellGPT might differ
from what is shown in the screenshots. These differences arise from the dynamic nature of the
AI's processing and the diverse environments in which it operates. As a result, you may observe
differences in command syntax, execution, and results while performing this lab task.
1. Click Parrot Security to switch to Parrot machine, and login with attacker/toor.
Open a Terminal window and execute sudo su to run the program as a root user
(When prompted, enter the password toor).
2. Run bash sgpt.sh command to configure ShellGPT and the AI activation key.
5. Scan result appears displaying the discovered vulnerabilities in the target website
(here, www.certifiedhacker.com), as shown in the screenshot.
Nikto scan takes long time to complete. You can terminate the scan, by
pressing Ctrl + Z.
6. In the terminal, run sgpt --chat vuln --shell "Perform vulnerability scan on
target url http://www.moviescope.com with Nmap" command to perform
vulnerability scan on the target website. The result appears displaying open ports
and services running on the target website.
7. Run sgpt --chat vuln --shell "Perform a vulnerability scan on target url
http://testphp.vulnweb.com with skipfish" to scan the target URL using
skipfish tool.
The location of scan report might differ. You can view the location in the
skipfish command generated by ShellGPT.
9. Firefox browser window appears displaying the complete scan report, as shown
in the screenshot.
10. Apart from the aforementioned commands, you can further explore additional
options within the ShellGPT tool and utilize various other tools to conduct
vulnerability assessments on the target.
12. Close all open windows and document all the acquired information.
Question 5.3.1.1