Skip to content

reatva/Vulnerability-Management-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Vulnerability Management Lab: Nessus + Windows Domain

This project simulates a vulnerability management workflow in a local Windows environment using open-source tools and manual patching. Adapts Josh Madakor Vulnerability Management Program It demonstrates a real-world vulnerability remediation workflow: from identifying, prioritizing, and remediating vulnerabilities to validating fixes through rescans.

Lab Setup (Optional for reproduction)

If you would like to recreate this lab:

  1. Deploy 3 VMs:
    • DC (Windows Server 2016)
    • CLIENT01 (Windows 10)
    • CLIENT2 (Windows 10)
  2. Ensure they are networked
  3. Configure DC as a Domain Controller
  4. Join both clients to the domain
  5. Set up Ubuntu Linux with Nessus Essentials
  6. Link Nessus Local Scan to Tennable Console

Lab Architecture

Alt text

  • Ubuntu VM: Runs Nessus Essentials
  • Windows Server: Domain Controller
  • CLIENT1: Windows 10
  • CLIENT2: WINDOWs 10

Vulnerability Management Process

Step Description
Identification Collected vulnerabilities using Nessus local Scan
Categorization Grouped by severity amount of vulnerabilities
Prioritization Focused first on Host with the most vulnerabilities, then medium then low
Remediation Applied OS updates, patched missing KB's
Verirification Ran a follow-up Nessus Scan to confirm fixes

Scan Phase

  1. Nessus Essentials installed and confifured to scan 10.10.1.200, 10.10.1.201, 10.10.1.202
  2. Initial scan discovered:
    • CLIENT1: 31 Vulnerabilities
    • CLIENT2: 172 Vulnerabilities
    • DC : 142 Vulnerabilities
  3. Inicial report here

Alt text

Fix Plan

System Affected Fix Plan Priority No of Vulns
CLIENT2 Install Windows Updates Critical 172
CLIENT2 Uninstall Microsoft 3D Implementations High 6
DC Install Windows Updates High 142
CLIENT1 Install Windows Updates Medium/Low 31

Remeditation Phase

  • Applied all critical Windows updates manualle via:
    • Windows Update GUI
  • Uninstall Microsoft Programs that aren't part of the Environment.
  • Verified services hardened
  • Snapshots taken before/after for tracking

Round 1: Installing Windows Updates in CLIENT2

  • Scan before installing updates and patching KB's

Alt text

  • Installed Windows updates in CLIENT2 reducing critical vulnerabilties to 0

Alt text

Alt text

Round 2: Installing Windows Updates in DC

  • Scan before installing updates and patching KB's

Alt text

  • Installed Windows updates in DC

Alt text

Alt text

Round 3: Installing Windows Updates in CLIENT1

  • Scan before installing updates and patching KB's

Alt text

  • Installed Windows updates in CLIENT1

Alt text

Alt text

Validation

  • Re-ran Nessus scan after updates
  • All critical vulnerabilities gone
  • Confirmed patch integrity and no service disruption
  • Final report here

First Cycle Remediation Effort Summary

The remediation process reduced total vulnerabilities by 87%, from 345 to 46. Critical vulnerabilities were resolved by the second scan (97.88%), and high vulnerabilities dropped by 84.88%. Mediums were reduced by 58.6%. In an actual production environment, asset criticality would further guide future remediation efforts.

Alt text

Tools Used

  • VirtualBox
  • Windows Server 2016 (DC)
  • Windows 10 Pro x2 (CLIENTS)
  • Ubuntu Linux (for Nessus local Scan)
  • Nessus (local Scan)
  • Tennable Cloud

Key Takeaways

  • Gained hands-on experience with vulnerability scanning.
  • Learned how to interpret Nessus plugin results and prioritize risks.
  • Practiced structured remediation planning and tracking across systems.
  • Compared real patching workflows to cloud-based vulnerability platforms like Tenable.

About

Hands‑on VM lab: Nessus scans & manual patching

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published