Reflection
Kain:
Kali is a multifaceted Linux operating system which is mainly focused towards security and penetration testing. It combines a wide range of tools, from port scanners both active and passive to forensic tools which can be used to pull deleted data off hard drives.
OpenVAS Scanning:
OpenVAS stands for Open Vulnerability Assessment System. It’s can be quite comprehensive in its scanning techniques as well assisting in finding vulnerabilities. It can be used in conjunction with other Kali tools to help pen test environments more efficiently. OpenVAS stands for Open Vulnerability Assessment Syste
Active Directory Access LDAP
Active Directory holds a great of critical information about a business or organisation regarding how its structured, who the participating members are, the groups and positions of those members, how the domain is defined and which computer groups are assigned
1.Investigate and discuss one of the SSL vulnerabilities found as a result of the OpenVAS scan that has a severity rating of 4 or higher.
We need to scan the OpenVAS interface and open the scanner. We can scan by selecting a specific port in a zone through the scanner. This scan is very intrusive and provides a great deal of depth; it looks for a very wide range of faults and some of which might not be very useful depending on the device being scanned.
Scanning with certain types of devices can be done using OpenVAS scanning. This in turn allows for more effective screening of vulnerabilities. We can enter specific Task Name and Target Host into the Advanced Task Wizard to display the report content on the dashboard.
We can click on the name of the scan to see more detailed results. As long as it refers to the date and type of scanner. We can click on the value of Reports and then distinguish the high, medium and low results in detail to represent the vulnerability related information. This vulnerability affects Axis2 installations as well as SAP BusinessObjects via the web service module (known as dswsbobje) and other products that are based on Axis2
2.Investigate and discuss the Common Vulnerabilities and Exposures (CVE) database
Common vulnerabilities We can scan through OpenVAS and click on the scan name to see the date. We can pass the date and then see the common vulnerabilities. In addition, we can click on the vulnerability to see what port is being used on the TCP service.
3.Outline the steps to use a vulnerability scanner to identify and remediate security issues
Log in to the OpenVAS interface and click on Configuration and then click on Ports. After that, we can check all the windows through the NMAP scanner. We can customize the scan through the scan configuration on the Configuration tab. This scanning method is invasive and provides a large depth. We can selectively scan to increase efficiency. Finally click Firefox to view the vulnerability. We can choose Full and fast ultimate for the controller search. The orange requirement will eventually be displayed on Greenbone. Find the vulnerability by clicking on the name and time.
We start Active Directory Users and Calculator by running dsa.msc. After that we can delete all users via ‘Pre-Windows 2000 Compatible Access’. After that, select the properties and click on Members. We can see which members of the group have this feature turned on. Finally we can click Delete to remove them from the group.
Critical Thinking Analysis
potential uses/ advantages/ pitfalls for this in securing a business
We can efficiently scan for vulnerabilities in specific files through OpenVAS scanning.
In addition, we also access LDAP through secure Active Directory. We can remove or disable certain threat groups for security purposes.
Finally, we can modify the security verification through OpenVAS. The advantage of this is that you can operate according to people’s wishes to reduce the risk of vulnerability intrusion.