- Microsoft Azure Virtual Machine
- Tenable Nessus Professional
- MySQL Community Server
- Microsoft PowerShell
Basics Tab:
- Resource group:
Create new> EnterVulnerabilityManagement - Virtual machine name: Enter
vulnerability-management-lab - Region:
US East 2 - Image:
Windows 10 Pro, version 22H2 - x64 Gen2 - Size:
Standard D2s v3 (2 vcpus, 8 GiB memory) - Administrator account: Enter secure credentials
Disks Tab:
OS disk type: Standard HDD (locally-redundant storage)
Networking Tab:
Tick ✅Delete public IP and NIC when VM is deleted
Monitoring Tab:
Boot diagnostics: Tick ✅Disable
Review + Create Tab:
Click the blue Create button
- Use Remote Desktop Connection to connect to the vulnerability-management-lab virtual machine with the corresponding admin credentials and choose desired privacy settings
-
Install Tenable Nessus Professional on the virtual machine
-
Open
wf.mscby searching for it in the search bar. When the Windows Defender Firewall with Advanced Security window appears, clickWindows Defender Firewall Properties -
On the Domain Profile tab, press the 'O' key and the desired settings will change. Repeat this process for the Private Profile and Public Profile tabs. Click
ApplyandOK
-
Open
Windows PowerShellas administrator by searching for it in the search bar and enter:Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name "LocalAccountTokenFilterPolicy" -Value 1 -Type DWord -Force`
- Restart the vulnerability-management-lab virtual machine
-
In Tenable Nessus Professional, click
Create new scan. SelectAdvanced Scan (Configure a scan without using any recommendations) -
Enter the appropriate information in the Settings > BASIC > General tab:
Name:
Vulnerability_Management_DemoTargets: Enter the vulnerability-management-lab virtual machine's private IP address (ex.
10.1.0.4) -
Tick ✅
Use fast network discoveryin the Settings > DISCOVERY > Host Discovery tab
-
To allow a credentialed scan, navigate to the Credentials tab and click on
Windows. Enter the secure previously set admin credentials for the vulnerability-management-lab virtual machine -
Tick the following under Global Credential Settings:
- ✅
Start the Remote Registry service during the scan - ✅
Enable administrative shares during the scan - ✅
Start the Server service during the scan
- ✅
- Launch the Vulnerability_Management_Demo scan by clicking the
▶button
-
Download
mysql-5.6.21-winx64.zipfrom the MySQL Community Server archive and extract toC:\mysql-5.6.21-winx64 -
Initialize MySQL service
- Open
Command Promptas administrator - Run commands:
cd C:\mysql-5.6.21-winx64 mysqld --initialize-insecure mysqld --install net start mysql
- Open
- Create Vulnerable Users
- In the same Command Prompt, connect to MySQL:
mysql -u root
- Create insecure users with full privileges:
CREATE USER 'admin'@'%' IDENTIFIED BY 'password123'; GRANT ALL PRIVILEGES ON *.* TO 'admin'@'%' WITH GRANT OPTION; CREATE USER 'test'@'%' IDENTIFIED BY 'test'; GRANT ALL PRIVILEGES ON *.* TO 'test'@'%' WITH GRANT OPTION; FLUSH PRIVILEGES;
- In the same Command Prompt, connect to MySQL:
- Configure Remote Access
- Create .txt file anywhere, open it with
Notepadand paste the following:[mysqld] basedir=C:/mysql-5.6.21-winx64 datadir=C:/mysql-5.6.21-winx64/data port=3306 bind-address=0.0.0.0
- Navigate to
File>Save Asand change Save as type toAll Files - In File name:, enter
my.iniand save it in theC:\mysql-5.6.21-winx64directory
- Create .txt file anywhere, open it with
- Open
Microsoft PowerShellas administrator - Run command:
Enable-WindowsOptionalFeature -Online -FeatureName "SMB1Protocol"
- Restart the vulnerability-management-lab virtual machine when prompted
- Download XAMPP v8.0.11
- Press
WINkey and type "UAC" - Click
Change User Account Control settings - Move slider to
Never notify - Click
OK
- Run
xampp-windows-x64-8.0.11-2-VS16-installerand keep all default components selected
- Restart the system after the installation completes
- Open the
xampp-control.exe(located inC:\xampp) - In the
XAMPP Control Panelclick onStartnext to Apache and FileZilla
- In the My Scans section of Tenable Nessus Professional, launch the Vulnerability_Management_Demo scan by clicking the
▶button and then observe the results after the scan finishes
- Stop and Remove MySQL Service
net stop mysql sc delete mysql
- Delete MySQL Directory
- Stop all XAMPP services from the
XAMPP Control Panel
- Kill the
xampp-controlprocess inTask Manager
- Delete the XAMPP directory
-
Open the Registry Editor:
- Press
Win + R, typeregedit, and pressEnter.
- Press
-
Navigate to the TLS Protocol Settings:
- Go to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\
- Go to:
-
Disable TLS 1.0 and 1.1:
- Inside the
Protocolskey, create the following subkeys if they don’t exist:TLS 1.0\Client TLS 1.0\Server TLS 1.1\Client TLS 1.1\Server - In each of these subkeys, create a
DWORD (32-bit)value namedEnabledand set it to0.
- Inside the
- Open
Microsoft PowerShellas administrator - Run command:
Disable-WindowsOptionalFeature -Online -FeatureName "SMB1Protocol"
- Restart the vulnerability-management-lab virtual machine when prompted
- Download latest MySQL Installer from official website
- Run installer and select:
- Server only
- Configure root with a secure password
- Download latest XAMPP from Apache Friends
- During installation:
- Select only necessary components
- Download and install latest Firefox version from official Mozilla website
- Configure Firefox to automatically update


































