IncidentResponsev2

Conduct Vulnerability Scan of Network Host

Task Conduct Vulnerability Scan

Conditions

Given a host with local administrator credentials, an incident response workstation, network access, and a vulnerability assessment tool.

Operator Note: Vulnerability scans must be authorized by the network owner, and the impact of scanning must be understood, especially in production environments.

Standards

Operator Note: Confirm scan profiles before running (e.g., “Safe Scan” vs “Full + Aggressive”) to avoid unintentionally disrupting hosts.

End State

All vulnerabilities on the test machine are found and critical or high results are evaluated for remediation.

Operator Note: Results should be saved, backed up, and shared securely with remediation team and incident command.

Manual Steps

nmap -sn 192.168.1.0/24

Operator Note: Ensure credentials are configured correctly in the vulnerability scanner for authenticated scanning to maximize detection capabilities.

Optional Tools

Nessus

Installation:

Usage:

Command-line (start Nessus scanner daemon on Linux):

sudo systemctl start nessusd

OpenVAS

Installation (Kali Linux):

sudo apt update && sudo apt install openvas
sudo gvm-setup
sudo gvm-check-setup

Installation (Ubuntu):

sudo apt install software-properties-common
sudo add-apt-repository ppa:mrazavi/gvm
sudo apt update && sudo apt install gvm
sudo gvm-setup

Usage:

Command-line scan example:

gvm-cli socket --xml "<create_target>" 

Operator Note: OpenVAS scans can be slower and heavier on the network — plan accordingly.


Running Script

N/A

Dependencies

Network access accounts:

Scanner installed and configured:

Operator Note: Update scanner feeds prior to scanning to ensure accurate vulnerability detection.

References

OpenVAS
Nessus
Greenbone Vulnerability Manager Installation Guide


Operator Recommendations and Additional Tools

Operator Checklist

Tools by Platform

Platform Tool Purpose
Universal Nessus Commercial, supported scanner with easy GUI
Linux OpenVAS / Greenbone Open-source vulnerability scanner
Windows/Linux/macOS Nmap (optional) Manual port/service discovery before scan
Linux Nikto (optional) Lightweight web server vulnerability scanner (optional use)

Alternate Commands and Examples

Simple Nmap pre-scan (optional prep step):

nmap -p- -sS 192.168.1.0/24

Run OpenVAS from CLI:

sudo gvm-start

Nessus start on Linux:

sudo systemctl start nessusd

Best Practices


Revision History

Date Version Description Author
2025-05-02 1.8 Full original + enriched vulnerability tool usage, commands, and operator guidance Leo