Now that you know about the various methods you can use to test vulnerability, in this video, see exactly how to use tools like stealth scanning, port scanning, fingerprinting, and OpenVAS to assist you in assessing various vulnerabilities.
- So we've talked a little bit about scanning.…The last topic was vulnerability scanning…which really is a composite type of approach.…We're scanning for multiple things at the same time.…As I mentioned, you have to be careful…because it can be very noisy…and it can really tip your hand…that you're actually about to attack a system.…So, let's go take a look at different ways…that we can actually scan.…In fact, we're going to just basically do…the things we've talked about in the previous few sections.…So let's go back into our lab environment…and let's try to execute a few vulnerability scans.…
We're going to start back in Kali.…Notice that I have, I'm in virtual box…and I have my two other virtual machines running.…I've got the DVWA and metasploitable2.…Remember, Metasploitable is running on 10.10.1.10.…DVWA is running on 10.10.1.11 and of course,…Kali is running on 10.10.1.12.…So, let's open a terminal window.…I'll open a new window here.…And in Kali, I'm going to execute a stealth scan.…
Remember what we use for stealth scans?…
Released
11/16/2018This Total Seminars course covers the exam certification topics. For information on additional study resources—including practice tests, lab simulations, books, and discounted exam vouchers—visit totalsem.com/linkedin. LinkedIn Learning members receive special pricing.
This course was created by Total Seminars. We are pleased to offer this training in our library.
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Share this video
Embed this video
Video: Vulnerability scanning demo