Ethical Hacking and Penetration Testing Guide


  Vulnerability Assessment ..........................................................................................121



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə6/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   2   3   4   5   6   7   8   9   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

 5 
Vulnerability Assessment ..........................................................................................121
What Are Vulnerability Scanners and How Do They Work? ..........................................121
Pros and Cons of a Vulnerability Scanner ...................................................................... 122
Vulnerability Assessment with Nmap ............................................................................ 122
Updating the Database .................................................................................................. 122
Scanning 
MS08 _ 067 _ netapi
............................................................................... 123
Testing SCADA Environments with Nmap ................................................................... 123
Installation ........................................................................................................... 124
Usage .................................................................................................................... 124
Nessus Vulnerability Scanner ......................................................................................... 124
Home Feed ............................................................................................................125
Professional Feed ...................................................................................................125
Installing Nessus on BackTrack ......................................................................................125
Adding a User .................................................................................................................125
Nessus Control Panel ............................................................................................ 126
Reports ........................................................................................................ 126
Mobile ......................................................................................................... 126
Scan ............................................................................................................ 127
Policies ......................................................................................................... 127
Users ............................................................................................................ 127
Configuration .............................................................................................. 127
Default Policies ..................................................................................................... 127
Creating a New Policy ................................................................................................... 128
Safe Checks.................................................................................................................... 128
Silent Dependencies ....................................................................................................... 128
Avoid Sequential Scans ......................................................................................... 128
Port Range ......................................................................................................................129
Credentials ............................................................................................................129
Plug-Ins .................................................................................................................129
Preferences ..................................................................................................................... 130
Scanning the Target .............................................................................................. 130
Nessus Integration with Metasploit .................................................................................132
Importing Nessus to Metasploit ......................................................................................132
Scanning the Target ...............................................................................................133
Reporting ..............................................................................................................133
OpenVas ................................................................................................................133
Resource ........................................................................................................................ 134
Vulnerability Data Resources ................................................................................ 134
Exploit Databases ..................................................................................................135


Contents
◾ 
xi
Using Exploit-db with BackTrack .................................................................................. 136
Searching for Exploits inside BackTrack .........................................................................137
Conclusion ......................................................................................................................138

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin