CS LAB
Task 2
Aim: To identify the vulnerabilities and exploit attack vectors on a target device by
scanning different parameters to accomplish common platform enumeration and
common vulnerabilities exposure using legion tool
The Legion tool is a package which is an open source, easy-to-use, super-extensible and
semi-automated network penetration testing tool that aids in discovery, reconnaissance and
exploitation of information systems.
Legion tool can be installed using the below command if it is not available predefined in kali
linux
‘sudo apt install legion’
We can start the legion tool from any terminal by simply “legion” command or in the
applications tab go to -> Vulnerability analysis -> legion(root)
This tool facilitates the Automatic detection of CVEs (Common Vulnerabilities and
Exposures and CPEs (Common Platform Enumeration).
CPE Information format
In the Hosts section, we have an option to add hosts to the scope. Simply click on add hosts
and we will get the below screen :
CS LAB
Here we can add a single IP, a range of IPs, or hostnames in the section. In order to add
multiple targets simply separate them with a semicolon.
Consider entering an IP address [Link], where after entering it in the scan section,
it will process for some time to find out the services. Parameters such as port no, protocol,
state of the port along with its name and version.
Under the hosts tab, the services, scripts, general information and the Common
vulnerability exposure associated with the host will be listed. This CVEs can be used as an
exploit to gain access to a system.
Then there is the option for Mode selection, in this section, we have Easy and Hard mode.
In Easy mode, we got nmap scanning options like staged scan and nmap host discovery. In
Hard mode, we get options like host discovery, custom port scanning, and custom
discovery options for port scanning such as Stealth SYN, FIN scan, NULL, Xmas scan,
TCP and UDP ping. In the additional arguments we have -O flag for OS detection and -sV
flag for service version. This scan takes considerably a higher amount of time when
compared with easy scan mode.
For eg: Consider that we are performing an Easy mode scan on [Link] with -sV and -O
arguments
Result: Thus the legion tool has been successfully explored to identify the vulnerabilities and
exploits in the target host and IP ranges.