IncidentResponsev2

4.31 Run Vulnerability Scan

Task Run Vulnerability Scan on Impacted and At-Risk Hosts

Conditions

Given access to a vulnerability scanning platform and the environment is contained and stabilized, the operator will execute comprehensive vulnerability scans on impacted and surrounding systems to identify unpatched software, misconfigurations, or weaknesses that could be exploited again.

Operator Note: Running a vulnerability scan during eradication ensures the environment is hardened before recovery and normal operations resume. Vulnerability scanning should include both impacted systems and adjacent/related assets.

Standards

End State

All vulnerable and misconfigured systems are identified and scheduled for remediation before recovery operations proceed.


Notes


Manual Steps

Step 1: Select and Prepare Vulnerability Scanner

Recommended Open-Source and Commercial Tools:

Tool Platform Installation Usage
OpenVAS / Greenbone Linux apt install openvasgvm-setup Web UI or CLI → Full network scan
Nessus Essentials Cross-platform Download Web UI → Local and remote host scans
Nmap with Vulners NSE script Cross-platform apt install nmap or brew install nmap nmap -sV --script vuln <target>
Qualys Vulnerability Scanner (commercial) Cloud Subscription required Web UI → Schedule and review scans

Operator Note: Nessus Essentials (free) and OpenVAS are highly recommended for small/mid environments due to ease of use and no-cost licensing.


Step 2: Define Scan Targets


Step 3: Configure and Execute Scan

Example - Nessus Essentials (Web UI)

Example - OpenVAS

gvm-cli socket --gmp-username admin --gmp-password password "start_task task_id"

Example - Nmap

nmap -sV --script vuln 192.168.1.100

Operator Note: Nmap + Vulners script is good for quick snapshot, but full vulnerability scanners are preferred for enterprise use.


Step 4: Review Scan Results


Step 5: Document and Report


Running Script (Nmap + Vulners Quick Scan Example)

nmap -sV --script vulners 192.168.1.0/24 -oA vulnscan_results

Operator Note: Generates XML and grepable output for easy parsing and documentation.


Dependencies


Other Available Tools

Tool Platform Installation Usage
OpenVAS Linux apt install openvasgvm-setup Full-featured vulnerability management
Nessus Essentials Cross-platform Download from vendor User-friendly, widely adopted scanner
Nmap Vulners Script Cross-platform nmap --script vulners Fast, script-based scan for known CVEs
Qualys / Rapid7 Enterprise Vendor provided Comprehensive enterprise solutions

Operator Note: Choose scanner based on environment size, criticality, and licensing availability.


Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

Nessus Essentials - Free Vulnerability Scanner
OpenVAS / Greenbone Community Edition
Nmap NSE Scripts - Vulners


Revision History

Date Version Description Author
2025-05-02 1.0 Fully generated operator guide for running vulnerability scans, tool usage, operator checklist Leo