MR TUMELO M BRADFORD UNIVERSITY COLLEGE
Cybersecurity Exercise: Network Scanning and Vulnerability Assessment
Objective:
To teach students how to perform network scanning and vulnerability assessment to identify
potential security issues in a network.
Materials Needed:
Computers with internet access
Network scanning tools (e.g., Nmap)
Vulnerability assessment tools (e.g., OpenVAS, Nessus)
A sample network setup (can be a virtual lab environment)
Instructions:
1. Introduction to Network Scanning:
o Begin with a brief lecture on the importance of network scanning in
cybersecurity.
o Explain the different types of network scans (e.g., TCP scan, UDP scan) and
their purposes.
o Discuss the ethical considerations and legal implications of network scanning.
2. Setting Up the Environment:
o Provide students with access to a virtual lab environment or a sample network
setup.
o Ensure that all necessary tools (e.g., Nmap, OpenVAS) are installed and
configured.
3. Network Scanning Activity:
o Demonstrate how to use Nmap to perform a basic network scan. Cover the
following steps:
Scanning for live hosts on the network
Identifying open ports and services
Detecting the operating systems and versions of the devices
o Have students perform their own network scans on the sample network and
document their findings.
4. Vulnerability Assessment:
o Introduce students to vulnerability assessment tools like OpenVAS or Nessus.
o Explain how these tools can identify vulnerabilities in the network and provide
remediation suggestions.
o Demonstrate how to run a vulnerability scan using one of these tools.
5. Vulnerability Assessment Activity:
o Have students run a vulnerability scan on the sample network using the chosen
tool.
o Ask them to analyze the scan results and identify the most critical
vulnerabilities.
o Discuss the potential impact of these vulnerabilities and possible mitigation
strategies.
6. Reporting and Documentation:
o Teach students how to create a comprehensive report based on their network
scanning and vulnerability assessment findings.
o The report should include:
An overview of the network scan results
A detailed analysis of the identified vulnerabilities
Recommendations for mitigating the vulnerabilities
7. Discussion and Analysis:
o Conduct a class discussion on the exercise. Ask students to share their
experiences and any challenges they faced.
o Emphasize the importance of regular network scanning and vulnerability
assessments in maintaining network security.
8. Follow-Up Activity:
o Assign a short research project where students investigate a recent network
security breach and present their findings to the class. This will help them
understand the real-world implications of network vulnerabilities.
Assessment:
Evaluate students based on their ability to perform network scans and vulnerability
assessments accurately.
Assess their reports for thoroughness, clarity, and the quality of their
recommendations.
Consider their participation in the class discussion and follow-up research project.
This exercise will help students gain practical skills in network scanning and vulnerability
assessment, which are essential for maintaining network security.
Nmap (Network Mapper) is a powerful tool used for network discovery and security auditing.
Here’s a step-by-step guide to help you get started with Nmap:
Step 1: Install Nmap
Windows: Download the installer from the official Nmap website and follow the
installation instructions.
Linux: Use your package manager. For example, on Ubuntu, you can install Nmap by
running:
sudo apt-get install nmap
macOS: Use Homebrew:
brew install nmap
Step 2: Basic Nmap Commands
1. Scan a Single Host:
2. nmap [Link]
This command scans the host [Link] for open ports.
3. Scan Multiple Hosts:
4. nmap [Link] [Link] [Link]
This command scans the specified IP addresses.
5. Scan a Range of IPs:
6. nmap [Link]-254
This scans all IP addresses from [Link] to [Link].
7. Scan a Subnet:
8. nmap [Link]/24
This scans all devices in the [Link]/24 subnet.
Step 3: Advanced Scanning Techniques
1. Stealth Scan (SYN Scan):
2. nmap -sS [Link]
This performs a stealthy TCP SYN scan.
3. Service Version Detection:
4. nmap -sV [Link]
This detects the versions of services running on open ports.
5. Operating System Detection:
6. nmap -O [Link]
This attempts to determine the operating system of the target.
7. Aggressive Scan:
8. nmap -A [Link]
This performs OS detection, version detection, script scanning, and traceroute.
Step 4: Using Nmap Scripts
Nmap has a powerful scripting engine (NSE) that allows you to run various scripts for more
detailed scans.
1. Run a Specific Script:
2. nmap --script=http-title [Link]
This runs the http-title script to retrieve the title of the web page.
3. Run Multiple Scripts:
4. nmap --script=http-title,http-headers [Link]
This runs both the http-title and http-headers scripts.
Step 5: Saving Scan Results
1. Save Output to a Text File:
2. nmap -oN [Link] [Link]
This saves the scan results to [Link].
3. Save Output in XML Format:
4. nmap -oX [Link] [Link]
This saves the scan results in XML format.
Additional Resources
Nmap Documentation: The official Nmap documentation provides detailed
information on all commands and options.
Tutorials and Videos: There are many tutorials available online, such as the Nmap
Tutorial for Beginners by HackerSploit1.
Nessus, a powerful vulnerability scanner:
Step 1: Install Nessus
1. Download Nessus:
o Go to the Tenable Nessus download page and select the appropriate version
for your operating system.
2. Install Nessus:
o Follow the installation instructions for your operating system. For example, on
Windows, run the installer and follow the prompts. On Linux, you might use a
command like:
o sudo dpkg -i Nessus-<version>.deb
Step 2: Start Nessus and Access the Web Interface
1. Start the Nessus Service:
o On Windows, the service starts automatically. On Linux, you might need to
start it manually:
o sudo systemctl start nessusd
2. Access the Web Interface:
o Open a web browser and navigate to [Link]
o You might need to accept a security certificate warning.
Step 3: Set Up Nessus
1. Create an Account:
o Follow the prompts to create an admin account.
2. Enter the Activation Code:
o Enter the activation code you received when you registered for Nessus.
Step 4: Create and Run a Scan
1. Create a New Scan:
o In the Nessus web interface, click on the “New Scan” button.
2. Choose a Scan Template:
o Select a scan template that fits your needs. For beginners, the “Basic Network
Scan” template is a good start.
3. Configure the Scan:
o Enter the scan name, description, and target IP addresses or ranges.
o Configure additional settings as needed, such as scan schedules and
credentials for authenticated scans.
4. Launch the Scan:
o Save the scan configuration and click the “Launch” button to start the scan.
Step 5: View and Analyze Scan Results
1. View Results:
o Once the scan is complete, click on the scan name to view the results.
o Nessus will display a list of discovered vulnerabilities, categorized by severity.
2. Analyze Vulnerabilities:
o Click on individual vulnerabilities to see detailed information, including
descriptions, affected hosts, and remediation steps.
Step 6: Generate Reports
1. Create a Report:
o In the scan results, click on the “Export” button to generate a report.
o Choose the desired format (e.g., PDF, HTML) and customize the report
content.
2. Download the Report:
o Save the report to your local machine for further analysis or sharing.
Additional Resources
Nessus Documentation: The official Nessus documentation provides detailed
information on all features and settings.
Video Tutorials: There are many helpful video tutorials available online, such as
the Nessus Tutorial for Beginnersby Josh Madakor1.