From the course: CompTIA PenTest (PT0-002) Cert Prep
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Vulnerability scanning demo
From the course: CompTIA PenTest (PT0-002) Cert Prep
Vulnerability scanning demo
- So we've talked a little bit about scanning. The last topic was vulnerability scanning, which really is a composite type of approach. We're scanning for multiple things at the same time. As I mentioned, you have to be careful because it can be very noisy, and it can really tip your hand that you're actually about to attack a system. So let's go take a look at different ways that we can actually scan. In fact, we're going to just basically do the things we've talked about in the previous few sections. So let's go back into our lab environment and let's try to execute a few vulnerabilities scans. We're going to start back in Kali. Notice that I have, I'm in a VirtualBox, and I have my two other virtual machines running. I've got the DVWA and Metasploitable 2. Remember, Metasploitable is running on 10.10.1.10, DVWA is running on 10.10.1.11, and of course Kali is running on 10.10.1.12. So let's open a terminal window. I'll open a new window here. And in Kali, I'm going to execute a…
Contents
-
-
-
-
Scanning and enumeration4m 16s
-
(Locked)
Scanning and demo10m 46s
-
(Locked)
Packet investigation7m 57s
-
(Locked)
Packet inspection demo5m 48s
-
(Locked)
Labtainers setup12m 9s
-
(Locked)
Labtainers lab: Wireshark8m 54s
-
(Locked)
Application and open-source resources11m 38s
-
(Locked)
Passive reconnaissance10m 7s
-
(Locked)
Active reconnaissance7m 50s
-
(Locked)
Vulnerability scanning8m 41s
-
(Locked)
Vulnerability scanning demo16m 20s
-
(Locked)
Labtainers lab: Network basics2m 50s
-
(Locked)
Labtainers lab: Nmap discovery3m 12s
-
(Locked)
Target considerations15m 36s
-
(Locked)
Analyzing scan output5m 1s
-
(Locked)
Nmap scoping and output options21m 4s
-
(Locked)
Nmap timing and performance options6m 31s
-
(Locked)
Prioritization of vulnerabilities9m 7s
-
(Locked)
Common attack techniques12m 5s
-
(Locked)
Automating vulnerability scans3m 35s
-
(Locked)
Credential attacks14m 31s
-
(Locked)
Labtainers lab: Password cracking2m 23s
-
(Locked)
Labtainers lab: Secure Sockets Layer2m 30s
-
(Locked)
Labtainers lab: Routing basics1m 37s
-
-
-
-
-
-
-
-
-
-
-