Jishan-LAB2-Metasploit-3 Report-Merged
Jishan-LAB2-Metasploit-3 Report-Merged
VAPT
ASSESSMENT
OVERVIEW
Executive Summary
Performed vulnerability assesment on
metasploit-3 generated VA report
withscan results fullfilld required 4
critical 3 high vulnerability
Document Version:
05-02-2023
Final Report
Table of Contents
OBJECTIVE ....................................................................................................................................................... 4
PROJECT EXECUTION ....................................................................................................................................... 4
1.1 EXECUTION SUMMARY ....................................................................................................................................................................... 4
1.2 PROJECT EXECUTION........................................................................................................................................................................... 5
1.3 VAPT ASSESSMENT ACTIVITIES ......................................................................................................................................................... 5
1.4 VAPT ACTIVITIES TIMELINE AND THE ISSUES STATUS ....................................................................................................................... 5
2. VULNERABILITY ASSESSMENT ...................................................................................................................... 7
FINDING SEVERITY RATINGS ............................................................................................................................ 7
2.1 Summary of Vulnerabilities....................................................................................................................... 8
2.2 Penetration Testing – Detailed Report ..................................................................................................... 8
CONCLUSION ................................................................................................................................................... 9
Report-1:
Nessus Report scan
OBJECTIVE
We are finding the vulnerabilities in metasploitable-3 using Nessus scan and carry the VAPT
exercise on the windows host (10.0.2.6) to review and understand the Risk Posture and
Cyber Security gaps that are observed during the VAPT in this we took 4 critical and 3 high
vulnerabilities to show in the report.
PROJECT EXECUTION
Addressable
Security Contexts Metasploit-3 windows machine (10.0.2.6)
Assessment
Methodology
Tools Used Nessus tool for Vulnerability Assessment & Penetration testing.
Resources Deployed
Intern Jishan
Below is the Time line for each phase during our VAPT engagement.
VAPT engagement in Date/Time range
phases
Phase 1 05-02-2023 09:11
Results:
Vulnerability Assessment and Penetration
Testing results
2. Vulnerability Assessment
I used Nessus tool to generate the report VA and PT on the windows machine metasploit-3.
The following section of the document captures the deep dive with technical insights for
eachassessed application in scope.
KEYLOGGER:
First I run the file explorer to the window machine it have more privileges to the window machine
(Meterpreter>ps –S explorer.exe) to get the PID(5196) thorough that id we will get more privileged
access to the metasploitable-3 machine.
Then migrate the PID 5196 to get more privileged access.
I Give the keystrokes command (keyscan_start -v )and get the notepad credentials in KALI.
Then after performed the migration
After it I run the command (keyscan_dump) and get the keylogges what I did into the
Conclusion:
The specific goals of the vulnerability assessment were achieved as per lab requirements
• Successfully generated the Nessus report with VA
• In generate report I showed 4 critical vulnerabilities 3 High vulnerabilities
• By using the kali we exploited the metasploit-3(10.0.2.6) windows and created a RDP machine
• Generated key strokes with migrating the PID
• Successfully key logs.
The above mentioned goals were successfully met.
Vulnerabilities by Host
• 10.0.2.6........................................................................................................................................................................4
s
ial
nt
sse
sE
ssu
Ne
s
ial
nt
sse
Vulnerabilities by Host
sE
ssu
Ne
10.0.2.6
4 3 0 0 0
CRITICAL HIGH MEDIUM LOW INFO
Vulnerabilities Total: 7
s
CRITICAL 10.0 97576 Apache Struts 2.3.5 - 2.3.31 / 2.5.x < 2.5.10.1 Jakarta Multipart Parser RCE
ial
(S2-045) (S2-046)
CRITICAL
HIGH
10.0*
9.3*
90192
59044 nt
ManageEngine Desktop Central 8 / 9 < Build 91100 Multiple RCE
HIGH 9.3* 48762 MS KB2269637: Insecure Library Loading Could Allow Remote Code
sE
Execution
* indicates the v3.0 score was not available; the v2.0 score is shown
ssu
Ne
10.0.2.6 4