0% found this document useful (0 votes)
27 views2 pages

Exploring Vulnerabilities with Legion Tool

The document outlines the use of the Legion tool for identifying vulnerabilities and exploit attack vectors on target devices through common platform enumeration and common vulnerabilities exposure. It provides installation instructions, scanning options, and modes of operation for the tool, including Easy and Hard modes with various scanning techniques. The successful exploration of the tool demonstrates its capability to detect vulnerabilities and exploits in specified hosts and IP ranges.

Uploaded by

prabhuai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views2 pages

Exploring Vulnerabilities with Legion Tool

The document outlines the use of the Legion tool for identifying vulnerabilities and exploit attack vectors on target devices through common platform enumeration and common vulnerabilities exposure. It provides installation instructions, scanning options, and modes of operation for the tool, including Easy and Hard modes with various scanning techniques. The successful exploration of the tool demonstrates its capability to detect vulnerabilities and exploits in specified hosts and IP ranges.

Uploaded by

prabhuai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

CS LAB

Task 2

Aim: To identify the vulnerabilities and exploit attack vectors on a target device by
scanning different parameters to accomplish common platform enumeration and
common vulnerabilities exposure using legion tool

The Legion tool is a package which is an open source, easy-to-use, super-extensible and
semi-automated network penetration testing tool that aids in discovery, reconnaissance and
exploitation of information systems.

Legion tool can be installed using the below command if it is not available predefined in kali
linux

‘sudo apt install legion’

We can start the legion tool from any terminal by simply “legion” command or in the
applications tab go to -> Vulnerability analysis -> legion(root)

This tool facilitates the Automatic detection of CVEs (Common Vulnerabilities and
Exposures and CPEs (Common Platform Enumeration).

CPE Information format


In the Hosts section, we have an option to add hosts to the scope. Simply click on add hosts
and we will get the below screen :
CS LAB

Here we can add a single IP, a range of IPs, or hostnames in the section. In order to add
multiple targets simply separate them with a semicolon.

Consider entering an IP address [Link], where after entering it in the scan section,
it will process for some time to find out the services. Parameters such as port no, protocol,
state of the port along with its name and version.

Under the hosts tab, the services, scripts, general information and the Common
vulnerability exposure associated with the host will be listed. This CVEs can be used as an
exploit to gain access to a system.

Then there is the option for Mode selection, in this section, we have Easy and Hard mode.
In Easy mode, we got nmap scanning options like staged scan and nmap host discovery. In
Hard mode, we get options like host discovery, custom port scanning, and custom
discovery options for port scanning such as Stealth SYN, FIN scan, NULL, Xmas scan,
TCP and UDP ping. In the additional arguments we have -O flag for OS detection and -sV
flag for service version. This scan takes considerably a higher amount of time when
compared with easy scan mode.

For eg: Consider that we are performing an Easy mode scan on [Link] with -sV and -O
arguments

Result: Thus the legion tool has been successfully explored to identify the vulnerabilities and
exploits in the target host and IP ranges.

You might also like