Module 03 Lab Assignment 1
Module 03 Lab Assignment 1
Fig 1 The search results appear, scroll down to view the underlying vulnerabilities in the
target service (here, SMB). You can click any link to view detailed information on the
vulnerability as shown in the screenshot.
.
Fig2. Run docker run -d -p 443:443 –-name openvas mikesplain/openvas command to
launch OpenVAS, Firefox browser appears, go to https://127.0.0.1/. OpenVAS login page
appears, log in with admin/admin as shown in the screenshot.
Fig3. In the Task Wizard we need enter the target IP address in the IP address or
hostname field and then click Start Scan button.
Fig5. run sgpt --chat nikto --shell “Launch nikto to execute a scan against the URL
www.certifiedhacker.com to identify potential vulnerabilities.” to launch Nikto scan on the target
website.
Fig5. Scan result appears displaying the discovered vulnerabilities in the target website (here,
www.certifiedhacker.com), as shown in the screenshot.
Fig6. run sgpt --chat vuln --shell “Perform vulnerability scan on target url
http://www.moviescope.com with Nmap” command to perform vulnerability scan on the target
website. The result appears displaying open ports and services running on the target website.
Fig7. Run sgpt --chat vuln --shell “Perform a vulnerability scan on target url
http://testphp.vulnweb.com with skipfish” to scan the target URL using skipfish tool.
Fig7. The skipfish begins scanning the target url. After the successful completion of the scan, report
is saved at the /tmp/skipfish_scan_output/ location, named as index.html. Navigate to the
location, right-click on index.html and open with Firefox ESR Web Browser, as shown in the
screenshot.
Fig7. Firefox browser window appears displaying the complete scan report, as shown in the
screenshot.
Lab Observations/ Vulnerability Analysis
The objective of this lab was to Perform Vulnerability Research with Vulnerability Scoring
Systems and Databases (Research Common Weakness Enumeration (CWE) is a category
system for software vulnerabilities and weaknesses), Perform Vulnerability Assessment using
Various Vulnerability Assessment Tools like OpenVAS and Perform Vulnerability Analysis using
ShellGPT. The ShellGPT swiftly interprets and executes commands, conducting scans,
identifying weaknesses, and suggesting mitigation strategies in real-time (sgpt --chat nikto --
shell “ Launch nikto to execute a scan against against target website to identify potential
vulnerabilities).