This repository documents a comprehensive vulnerability management assessment conducted for CyberTech Solutions, focusing on Linux servers and web applications. Using Nessus Essentials for credentialed scans and web application testing, and Ansible for automated patching, the project identifies critical vulnerabilities (notably CVE-2018-16843/44/45 affecting Nginx), remediates them, and verifies resolution with post-patch scans. It also demonstrates configuring Nessus to send automated reports via Gmail SMTP.
- Conduct a credentialed SSH vulnerability scan on the Linux server to discover misconfigurations and outdated services.
- Perform a web application scan against Nginx to enumerate CVEs and assess exploitability.
- Configure Nessus for automated email reporting using SMTP (Gmail).
- Use Ansible to automate patching of Nginx and ensure system packages are updated.
- Re-run scans to validate remediation and produce an executive summary for stakeholders.
- Nessus Essentials β vulnerability scanning
- Ansible β automated configuration & patch management
- Linux CLI β SSH, systemctl, wget, apt, etc.
- SMTP (Gmail) β automated Nessus report delivery
- NIST National Vulnerability Database (NVD) β CVE & CVSS references
- Credentialed SSH scan: configured Nessus with root credentials to inspect the Linux server.
- Web application scan: executed Nessus Web Application Test against the Nginx service without authentication.
- Vulnerability analysis: correlated Nessus findings with CVEs and assessed severity, exploit availability, and NIST descriptions.
- Automated patching: wrote an Ansible playbook (
update_nginx.yml) to remove outdated manual installs, update package lists, install latest Nginx, and enable the service. - Email configuration: set up SMTP in Nessus using a Gmail app password to send scan reports.
- Validation scans: performed post-patching scans to confirm vulnerabilities were resolved.
- Outdated Nginx version prior to patch exposed the server to CVE-2018-16843/44/45 (remote code execution & denial-of-service potential).
- Multiple high-severity vulnerabilities discovered via web application scan, each with associated exploit availability and CVSS scores.
- Lack of automated reporting initially; fixed by configuring SMTP for email reports.
- Patched Nginx to the latest version via Ansible, eliminating critical vulnerabilities.
- Configured Nessus to send automated reports via Gmail, improving visibility and compliance.
- Follow-up scans verified that all identified vulnerabilities were closed.
- Prepared an executive technical report detailing the process, findings, and recommendations.
TECHNICAL REPORT FOR VULNERABILITY MANAGEMENT.pdfβ comprehensive technical report detailing the full assessment and remediation.Copy of VULNERABILITY MANAGEMENT TASK.pdfβ step-by-step instructions and task list used to perform the assessment.screenshots/β (empty) folder for future evidence such as scan results, console outputs, and patch verification.README.mdβ youβre reading it!
- Schedule regular credentialed and web application scans (e.g., monthly) to detect emerging vulnerabilities.
- Apply critical patches within a 30-day remediation window; leverage automation tools like Ansible.
- Integrate Nessus reporting into your SIEM for centralized monitoring.
- Extend automated patching to other services and maintain consistent configurations across hosts.
- Conduct continuous training for staff on vulnerability management best practices.
This project was conducted by Kiridi David Ebi in collaboration with SOC Team Two at CyberTech Solutions. It demonstrates our teamβs commitment to proactive security and resilience.
For more details, read the full report and feel free to connect on LinkedIn.