๐ก๏ธ Vulnerability Assessment of Metasploitable 2 Using Nessus ๐ Overview
This project demonstrates a vulnerability assessment conducted on a deliberately vulnerable Linux system (Metasploitable 2) using Nessus Essentials. The assessment identified critical security flaws including backdoors, remote code execution vulnerabilities, weak cryptographic configurations, and insecure authentication mechanisms.
๐ฏ Objectives
- Identify critical vulnerabilities using Nessus
- Analyze and map findings to known CVEs
- Assess risk based on severity and exploitability
- Provide actionable remediation strategies
๐งฐ Tools Used
- Kali Linux
- Nessus Essentials
- Nmap
- Metasploitable 2
๐ Methodology
Conducted service enumeration using Nmap
Performed credentialed vulnerability scan using Nessus
Analyzed vulnerabilities based on CVSS severity
Mapped findings to known CVEs
Developed remediation strategies
๐จ Key Findings
- UnrealIRCd Backdoor (CVE-2010-2075) Critical backdoor allowing remote command execution
- Bash Shellshock RCE (CVE-2014-6271) Allows arbitrary command execution via environment variables
- Weak Debian SSH Keys (CVE-2008-0166) Predictable SSH keys enabling unauthorized access
- VNC Weak Authentication (CVE-1999-0506) Weak password vulnerability allowing unauthorized remote access
- SSLv2/SSLv3 Enabled (CVE-2016-0800, CVE-2014-3566) Vulnerable to cryptographic downgrade and decryption attacks
๐ ๏ธ Remediation Summary
Remove compromised or backdoored services
Patch all outdated software and libraries
Enforce strong authentication mechanisms
Disable insecure protocols (Telnet, SSLv2/3)
Restrict service access using firewall rules
Implement secure configuration and hardening practices
๐ Key Insights
Legacy systems contain multiple critical vulnerabilities exploitable with minimal effort
Credentialed scans provide deeper visibility into system weaknesses
Misconfigurations and outdated protocols significantly increase attack surface
Proper patching and service hardening are essential for system security
๐ง Conclusion
This assessment highlights the importance of vulnerability management, secure configurations, and regular patching in maintaining system security. The findings demonstrate how multiple high-severity vulnerabilities can lead to full system compromise if left unaddressed.