Lightweight Vulnerability Scanner for Resourced-constrained Organizations
Jose E. Rodriguez 35962177d8 Update 'Virtual Machines/README.md' 3 週間 前
..
README.md Update 'Virtual Machines/README.md' 3 週間 前

README.md

Virtual Machines (VirtualBox)

This folder documents two pre-configured VirtualBox VMs used for the project. Default password for both the virtual machines is ccom4088.

Download

Access the VMs here:
Google Drive - VM Files


1. Vulnerability Scanner VM

Base OS: Ubuntu
Purpose: Hosts the full NVSRCO scanning tool, including:

  • Python scripts for host discovery, port scanning, and vulnerability scanning
  • OpenVAS container
  • Dash web dashboard
  • Python scheduler

How to Use:

  • Start the VM
  • Open the terminal
  • Ensure Docker is running (docker ps)
  • Go to the projects directory cd Downloads/Projecto
  • Run the Python scheduler: bash sudo ./venv/bin/python scheduler.py

2. WireGuard Client VM

Base OS: Ubuntu
Purpose: Acts as a remote client with a pre-configured WireGuard client setup.

Configuration Path:

/etc/wireguard/wg0.conf

What You Must Edit Before Use:

  • Endpoint: Set this to the IP of your scanner
  • PublicKey: Set this to the public key of your scanner

Example:

[Peer]
PublicKey = <SCANNER_PUBLIC_KEY>
Endpoint = <SCANNER_IP>:51820
AllowedIPs = 0.0.0.0/0

After editing, start WireGuard:

sudo wg-quick down wg0 
sudo wg-quick up wg0

Notes

  • Ensure your virtual network settings (bridged or host-only) allow communication between the client and scanner