Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1.

Slides:



Advertisements
Présentations similaires
Primary French Presentation 2 Saying How You Are.
Advertisements

Les choses que j aime Learning Objective: To know how to use j aime to talk about things I like to do.
Start with verb ? in the ? tense Start with verb ? in the ? tense Change the ? of my participe passé with ? Change the ? of my participe.
La célèbre chaîne de magasins H&M a créé une collection entièrement inspirée par les forêts et les jardins. C'est précisément pour cela qu’elle a créé.
Le passé composé The perfect tense Eg: J’ai mangé une pizza I have eaten/ate a pizza.
French 101 Important Verbs. The most important French verbs – avoir (to have), être (to be), and faire (to do/make) They are used in some of the ways.
La mémoire(1): Comment bien travailler
Alien has just landed in Disneyland Paris and is at the tourist information centre. He needs some help with asking questions.
WE’RE ALMOST DONE – CONGRATULATIONS! LE PRONOM « Y »
Verb  a word that show action or a state of being.  Examples: run, jump, play, talk, listen  In English, we just the verb “to be” to describe how people.
Fiche méthodologique 1: How to understand a text? (Written comprehension) General remarks: 1.It is OK NOT to understand everything…….yes, it is!! 2. You.
What’s the weather like?. Look at the verb phrase fait-il above Turn it around and you have il fait The phrase Il fait can be used to describe lots of.
Unité 3 Le passé composé avec ÊTRE. Le passé composé The passé composé is a PAST TENSE used to tell what has happened in the past. As its name implies,
Negative sentences Questions
QA-QC Meeting Cosmic Bench 11 January Aim of the Cosmic Bench Efficiency characterisation Identify problems along the whole detection chain: dead.
An Introduction To Two – Port Networks The University of Tennessee Electrical and Computer Engineering Knoxville, TN wlg.
Traffic Sign Recognition Jacob Carlson Sean St. Onge Advisor: Dr. Thomas L. Stewart.
IP Multicast Text available on
Template Provided By Genigraphics – Replace This Text With Your Title John Smith, MD 1 ; Jane Doe, PhD 2 ; Frederick Smith, MD, PhD 1,2 1.
Multisim Tutorial An Introduction to the Interface.
From Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide by Diane Teare, Bob Vachon and Rick Graziani ( ) Copyright © 2015 Cisco Systems,
UNEP / ICCA Workshop TEMA June DG and GHS Classification System.
1. Neal Creative | click & Learn more Neal Creative © TIP │ Use the built-in c olor palette with green and yellow for callouts and accents Neal Creative.
TP4
Les robots de la maison Je mets la table.
Notes for teacher. You can just use slides 2-5 if you wish. If you want to do the practical activity (slides 6-8) you will need to: print off Slide 6.
Reference Document Document de référence
(= for (how long) / since (when?)
Unité 1 : Coucou ! L’article indéfini dans la salle de classe.
LES MODULES PLAN DE DEVELOPPEMENT PERSONNEL LEADERSHIP ART ORATOIRE.
IGTMD réunion du 4 Mai 2007 CC IN2P3 Lyon
Qu’est-ce qu’ils aiment faire?
l y a which we have already learned means “there is/are l y a which we have already learned means “there is/are.” When we put a measure of time.
Cross Cutting Mapping Project
Notes le 28 octobre ÊTRE (to be) je suis (I am) nous sommes (we are)
Quantum Computer A New Era of Future Computing Ahmed WAFDI ??????
- User case - 3D curve length optimization
Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics Statistics & Econometrics.
Conjugating regular –re verbs in French
Français II Jeudi 16 février
Conjugating regular –er verbs en français
Les Fruits :.
Theme One Speaking Questions
There are so many types of sports. For example-: Basketball,volleyball, cricket, badminton, table tennis, football, lawn tennis etc.
Quiz What are the different Copper cable types ? How is STP better than UTP ? What type of cable should we use between : Router-Switch, PC-Router, Hub-Switch.
in French and in English
Introduction to Computational Journalism: Thinking Computationally JOUR479V/779V – Computational Journalism University of Maryland, College Park Nick Diakopoulos,
Le soir Objectifs: Talking about what you do in the evening
Qu’est-ce que tu as dans ta trousse?
Benchmarking noise policies
Quelle est la date aujourd’hui?
Quelle est la date aujourd’hui?
Nous allons apprendre…
les instructions Bonjour la classe, sortez vos affaires
Qu’est-ce que tu as dans ta trousse?
Quelle est la date aujourd’hui?
1-1 Introduction to ArcGIS Introductions Who are you? Any GIS background? What do you want to get out of the class?
Les Verbes Réfléchis What you do to yourself.
What’s the weather like?
5 Whys A technique for getting past first impressions and finding the root cause of a problem.
BRMS Implementation Status Update Template designed by 18-July-2015.
POWERPOINT PRESENTATION FOR INTRODUCTION TO THE USE OF SPSS SOFTWARE FOR STATISTICAL ANALISYS BY AMINOU Faozyath UIL/PG2018/1866 JANUARY 2019.
© by Vista Higher Learning, Inc. All rights reserved.4A.1-1 Point de départ In Leçon 1A, you saw a form of the verb aller (to go) in the expression ça.
LO – Watch the video and create the LO for today’s lesson!
les instructions Bonjour la classe, sortez vos affaires
Quelle heure est-il? français b.
Dans ma Salle de classe
Les pronoms-Pronouns.
Les négatifs et l’interrogation
Les opinions Les opinions = Opinions. In this lesson pupils will learn to understand and give their own opinions about singular items.
Transcription de la présentation:

Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1

plan introduction Advanced vulnerability scanning with openvas Basic vulnerability scanning with Nessus Basic vulnerability scanning with Nexpose Basic vulnerability scanning with openvas Advanced vulnerability scanning with Nexpose Advanced vulnerability scanning with Nessus conclusion 2

Once access to a network has been gained and the systems within that network have been identified, the next step is establishing a foothold and persistent access. There are several tools that are available to help identify and exploit systemic vulnerabilities, but we will be focusing only on three of them in this chapter(OpenVAS, Nessus, Nexpose ) introduction 3

Basic vulnerability scanning with OpenVAS 4

Basic vulnerability scanning with openvas 5 OpenVAS successfully installed and configured Access to the Kali system confirm the IP address of lab network

Basic vulnerability scanning with openvas 6

Basic vulnerability scanning with openvas 7 Scans | Tasks | Task Wizard

Basic vulnerability scanning with openvas 8

9

10

Basic vulnerability scanning with openvas 11

Advanced vulnerability scanning with OpenVAS 12

advanced vulnerability scanning with openvas 13 Navigate to Configuration | Credentials

advanced vulnerability scanning with openvas 14 Navigate to Configuration | Targets

advanced vulnerability scanning with openvas 15 Navigate to Configuration | Scan Configs

advanced vulnerability scanning with openvas 16 The Fast and Full Scan is the configuration we used for our scan We put these three components – target, credentials, and a scan configuration together to create a task From this point deep vulnerability scan will be run

advanced vulnerability scanning with openvas 17 Navigate to Scans | Tasks, and click on the New Task icon From this point deep vulnerability scan will be run

Basic vulnerability scanning with Nessus 18

Basic vulnerability scanning with Nessus 19 Kali Linux is running and you are logged in as root Start the Metasploitable virtual machine Nessus is started

Basic vulnerability scanning with Nessus 20

Basic vulnerability scanning with Nessus 21

Basic vulnerability scanning with Nessus 22

Basic vulnerability scanning with Nessus 23

Basic vulnerability scanning with Nessus 24

Basic vulnerability scanning with Nessus 25

Basic vulnerability scanning with Nessus 26

Basic vulnerability scanning with Nessus 27

Advanced vulnerability scanning with Nessus 28

Advanced vulnerability scanning with Nessus 29

Advanced vulnerability scanning with Nessus 30

Advanced vulnerability scanning with Nessus 31

Advanced vulnerability scanning with Nessus 32

Advanced vulnerability scanning with Nessus 33

Advanced vulnerability scanning with Nessus 34

Basic vulnerability scanning with Nexpose 35

36 Basic vulnerability scanning with Nexpose Kali Linux is running use the NAT network on all VMs Start Metasploitable and Windows XP machine with the NAT network

37 Basic vulnerability scanning with Nexpose

38 Basic vulnerability scanning with Nexpose

39 Basic vulnerability scanning with Nexpose

40 Basic vulnerability scanning with Nexpose

41 Basic vulnerability scanning with Nexpose

42 Basic vulnerability scanning with Nexpose

43 Basic vulnerability scanning with Nexpose

Advanced vulnerability scanning with Nexpose 44

Advanced vulnerability scanning with Nexpose 45

Advanced vulnerability scanning with Nexpose 46

Advanced vulnerability scanning with Nexpose 47

Advanced vulnerability scanning with Nexpose 48

Advanced vulnerability scanning with Nexpose 49

conclusion  In this chapitre analys ulenarability we se the technique of scaninc to find vulinablitys in the machin targert (victime),we used diffrents tools (openvas,nessus,nexpose) 50

T 51