Practical Lab Task:
Vulnerability Identification, Assessment, and mitigation
       Objective of the Task: This lab’s objective is to develop practical skills in identifying
vulnerabilities in information systems, assessing their criticality, and proposing mitigation
measures. Students will select a virtual machine (VM) with mid-level vulnerabilities from
online platforms such as VulnHub or Hack The Box (HTB), conduct penetration testing, and
document the vulnerabilities found. The report must include steps to identify and assess
vulnerabilities and recommend mitigation strategies.
Requirements
   1. Tools/Software Needed:
         o PC/Laptop
         o VirtualBox Download VirtualBox
         o Access to Vulnerable VMs
             Platforms:
                 ▪ VulnHub – VMs designed for practice and learning.
                 ▪ Hack The Box – An online platform with various penetration testing
                    challenges.
Task Instructions
   1. Select a Target VM:
          o Choose a vulnerable VM from either VulnHub or Hack The Box (HTB).
              Make sure the VM has medium-level vulnerabilities to ensure both
              educational value and manageable difficulty.
   2. Set Up the Lab Environment:
          o Install VirtualBox and import the downloaded VM.
          o Ensure your host machine and VM have network connectivity (NAT or
              Bridged mode).
   3. Perform the Penetration Test:
      a) Reconnaissance & Information Gathering:
      Use tools such as:
          o Nmap: To scan open ports and services.
          o Netdiscover: To identify live hosts on the network.
          o Whois or NSLookup: For domain information gathering.
       Example Command:
       nmap -A -T4 target_ip
Objective: Identify open ports and running services that might be exploited.
b) Vulnerability Scanning and Analysis:
Use automated tools like:
   •   OpenVAS or Nessus: To perform vulnerability scanning.
   •   Nikto: For web server vulnerability detection.
        Example Command:
        nikto -h http://target_ip
   1. Vulnerability Identification and Assessment:
         o Use the gathered data to identify specific vulnerabilities.
         o Assess the criticality of each vulnerability based on:
                ▪ CVSS Score (if available)
                ▪ Potential Impact (Data exposure, unauthorized access, etc.)
                ▪ Ease of Exploi
Documentation and Report Structure
The report must include the following sections:
   1. Introduction:
         o Brief description of the target system.
         o Purpose of the penetration test.
   2. Tools and Methodology Used:
         o List of tools employed (e.g., Nmap, Nikto).
         o Brief explanation of each tool and its purpose.
   3. Vulnerability Identification and Assessment:
         o Summary Table: List the identified vulnerabilities, their impact, and CVSS
             scores (if applicable).
         o Sample Table:
       Vulnerability                Impact              CVSS Score              Affected Component
 SQL Injection             Data Exposure             9.8                       Login Page
 Open Port (SSH)           Unauthorized Access       5,3                       SSH Service
   4. Mitigation Recommendations:
   •    For each vulnerability, propose specific mitigation actions (e.g., patching, disabling
        unnecessary services).
   5. Conclusion:
   •    Summary of findings.
   •    Reflections on challenges faced during the process.
Optional Tools and Resources
Depending on the nature of the VM and discovered vulnerabilities, students may need
additional tools, such as:
   •    BackTrack Linux / Kali Linux (distributions containing security tools).
  •   Knoppix Security Tools Distribution (STD)
      Knoppix STD – A live Linux distribution with pre-installed security tools.
      Useful Security Tools from Knoppix STD:
                  Category                                          Tools
Network Sniffing                                Dsniff, Ettercap, Kismet, Wireshark
File Integrity Checking                         Autopsy, RootkitHunter, Sleuthkit
Vulnerability Scanning                          Nmap, Metasploit, Hydra, SuperScan
Wireless Scanning                               Airsnarf, Kismet, WiFiTAP
Password Cracking                               John the Ripper, Hydra, WebCrack
Assessment Criteria
  •   Completeness of Documentation (20%)
  •   Accuracy of Vulnerability Identification (30%)
  •   Correctness of Vulnerability Assessment (20%)
  •   Effectiveness of Mitigation Strategies (20%)
  •   Overall Presentation and Clarity (10%)
Submission Guidelines
  •   Submit your final report as a PDF through the Microsoft Teams channel.
  •   Include screenshots of key steps (e.g., open ports, vulnerability scan results).
  •   Submission Deadline: 10 days after starting the task.
Important Notes
  •   This task is individual; each student should select a different target VM.
  •   Students can use online resources but must reference any external material.
  •   Plagiarism will result in disqualification from the lab.