Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Kali practice-vulnerability scanning

2025-02-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

In the host discovery, port discovery, service scanning to get the target system open port services, service version information, and then you can view the version information and patch list on the official website of the software, while high-risk vulnerabilities can directly control the target system.

On this basis, make a basic judgment on the vulnerabilities and weaknesses of the target system, but there will be a lot of drawbacks. There are a variety of services running on many scanning ports, and you will be busy querying official documents on major websites. Reading a large number of articles makes you very tired, which is relatively expensive and slow.

We can go to various libraries to search for vulnerabilities, and then verify them one by one, this is also a method, but the efficiency is not high, you may not be good at programs written in different languages, so at this time, the requirements for * testers are higher and more difficult, there is an easy way to use vulnerability scanners, these scanners call vulnerabilities to exploit the code for various probes toward your specified target.

Course catalogue:

Brief introduction to vulnerability scanning

Basic concept of vulnerability

NMAP- scan script

Vulnerability Scanner-openvas initialization

Weakness Scanner-openvas (2)

Weakness Scanner-openvas (3)

Vulnerability Scanner-openvas (scan configuration)

Download and install NESSUS-

Basic configuration of NESSUS

NESSUS- scanning (1)

NESSUS scanning (2)

NEXPOSE environment preparation

Detailed explanation of NEXPOSE function (1)

Detailed explanation of NEXPOSE function (2)

Detailed explanation of NEXPOSE function (3)

Curriculum objectives

Master vulnerability scanner invocation vulnerabilities exploit code to make various probes toward your specified target

Online video http://edu.aqniu.com/course/300/lesson/list

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report