Author: Aman Sharma
Contact: aman825077@gmail.com
This project demonstrates the end-to-end vulnerability management lifecycle on a controlled lab environment.
The target system was DVWA (Damn Vulnerable Web Application) hosted on a VM, with scanning and exploitation conducted from Kali Linux using Nmap, Nessus Essentials, and Metasploit.
A total of 117 vulnerabilities were discovered:
- 🟥 Critical: 8
- 🟧 High: 5
- 🟨 Medium: 19
- 🟦 Info: Remaining
- Nmap – Host discovery & service enumeration
- Nessus Essentials – Vulnerability scanning & CVSS scoring
- Metasploit Framework – Exploitation testing & validation
- DVWA (Damn Vulnerable Web App) – Target vulnerable web application
- Kali Linux – Attacker environment
- Environment Setup: DVWA deployed on vulnerable VM, Kali Linux attacker VM with Nessus & Metasploit.
- Discovery: Nmap scan to identify live hosts and open ports.
- Scanning: Nessus authenticated scans against DVWA VM.
- Analysis: Review severity ratings (CVSS, VPR) and validate results.
- Exploitation: Used Metasploit to test select vulnerabilities (Ghostcat RCE, VNC Weak Password).
- Remediation: Applied patches, disabled weak services (SSLv2, Telnet), enforced secure configs.
| Severity | Vulnerability | Description |
|---|---|---|
| 🟥 Critical | Apache Tomcat Ghostcat RCE (CVE-2020-1938) | Remote code execution vulnerability |
| 🟥 Critical | VNC Weak Password | Default credentials allowed access |
| 🟥 Critical | SSL v2/v3 Detected | Outdated encryption protocols |
| 🟧 High | Samba Badlock Vulnerability | Samba flaw enabling compromise |
| 🟧 High | NFS Shares World Readable | Insecure file shares accessible |
| 🟨 Medium | Telnet Service Detected | Insecure cleartext communication |
| 🟨 Medium | TLS 1.0 Supported | Deprecated protocol still enabled |
- Enforce strong authentication (remove default creds)
- Disable SSL v2/v3 and TLS 1.0 → enforce TLS 1.2/1.3
- Patch Apache Tomcat, Samba, and NFS services
- Replace Telnet with SSH
- Continuous vulnerability management with periodic rescans
This lab project showcases practical vulnerability management skills:
- Discovery → Analysis → Exploitation → Remediation
- Hands-on with Nmap, Nessus, DVWA, and Metasploit
- Aligns with industry roles like SOC Analyst, Vulnerability Analyst, Security Engineer
📌 Author: Aman Sharma






