Lecture Penetration testing: Finding vulnerabilities
Số trang: 21
Loại file: pdf
Dung lượng: 601.98 KB
Lượt xem: 27
Lượt tải: 0
Xem trước 3 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Lecture "Penetration testing: Finding vulnerabilities" provide students with knowledge about: Nmap scripting engine; Web application scanning; Metasploit; Manual analysis. Please refer to the detailed content of the lecture!
Nội dung trích xuất từ tài liệu:
Lecture Penetration testing: Finding vulnerabilities Finding Vulnerabilities Contents Nessus Nmap scripting engine Metasploit Web application scanning Manual analysis 1. Nessus Nessus Tenable Security’s Nessus is one of the most widely used commercial vulnerability scanners, though many vendors provide comparable products Using TCP port 8834 root@kali:~# service nessusd start Nessus Nessus Nessus Nessus Nessus ranks vulnerabilities based on the Common Vulnerability Scoring System (CVSS), version 2, from the National Institute of Standards and Technology (NIST). Ranking is calculated based on the impact to the system if the issue is exploited 2. Nmap scripting engine Nmap scripting engine The available scripts fall into several categories, including information gathering, active vulnerability assessment, searches for signs of previous compromises Nmap scripting engine #nmap --script-help Nmap scripting engine 3. Metasploit Metasploit scanner modules Metasploit can conduct vulnerability scanning via numerous auxiliary modules. These modules will not give us control of the target machine, but they will help us identify vulnerabilities for later exploitation Metasploit exploit Check Functions Some Metasploit exploits include a check function that connects to a target to see if it is vulnerable, rather than attempting to exploit a vulnerability 4. Web application scanning Web application scanning Nikto Web application scanning Acunetix Web Vulnerability Scanner 5. Manual analysis Manual analysis Exploring a Strange Port
Nội dung trích xuất từ tài liệu:
Lecture Penetration testing: Finding vulnerabilities Finding Vulnerabilities Contents Nessus Nmap scripting engine Metasploit Web application scanning Manual analysis 1. Nessus Nessus Tenable Security’s Nessus is one of the most widely used commercial vulnerability scanners, though many vendors provide comparable products Using TCP port 8834 root@kali:~# service nessusd start Nessus Nessus Nessus Nessus Nessus ranks vulnerabilities based on the Common Vulnerability Scoring System (CVSS), version 2, from the National Institute of Standards and Technology (NIST). Ranking is calculated based on the impact to the system if the issue is exploited 2. Nmap scripting engine Nmap scripting engine The available scripts fall into several categories, including information gathering, active vulnerability assessment, searches for signs of previous compromises Nmap scripting engine #nmap --script-help Nmap scripting engine 3. Metasploit Metasploit scanner modules Metasploit can conduct vulnerability scanning via numerous auxiliary modules. These modules will not give us control of the target machine, but they will help us identify vulnerabilities for later exploitation Metasploit exploit Check Functions Some Metasploit exploits include a check function that connects to a target to see if it is vulnerable, rather than attempting to exploit a vulnerability 4. Web application scanning Web application scanning Nikto Web application scanning Acunetix Web Vulnerability Scanner 5. Manual analysis Manual analysis Exploring a Strange Port
Tìm kiếm theo từ khóa liên quan:
Lecture Penetration testing Penetration testing Finding vulnerabilities Bài giảng Kiểm thử xâm nhập Nmap scripting engine Web application scanningGợi ý tài liệu liên quan:
-
Lecture Penetration testing: Attack
22 trang 37 1 0 -
Lecture Penetration testing: Introduction to penetration testing
41 trang 35 0 0 -
178 trang 34 0 0
-
Lecture Penetration testing: Capturing traffic
13 trang 32 0 0 -
Ebook Metasploit - The penetration testers guide
332 trang 31 0 0 -
Ebook The basics of web hacking - Tools and techniques to attack the web
153 trang 30 0 0 -
Lecture Penetration testing: Information gathering
54 trang 26 0 0 -
Trùng The basics of hacking and penetration testing
178 trang 22 0 0 -
Ebook Wardriving & wireless penetration testing: Part 1
183 trang 22 0 0 -
Ebook Metasploit toolkit for penetration testing, exploit development and vulnerability research
290 trang 19 0 0