Télécharger la présentation
La présentation est en train de télécharger. S'il vous plaît, attendez
Publié parwailou wail Modifié depuis plus de 5 années
1
Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1
2
plan introduction Advanced vulnerability scanning with openvas Basic vulnerability scanning with Nessus 2 3 4 5 6 7 1 8 Basic vulnerability scanning with Nexpose Basic vulnerability scanning with openvas Advanced vulnerability scanning with Nexpose Advanced vulnerability scanning with Nessus conclusion 2
3
Once access to a network has been gained and the systems within that network have been identified, the next step is establishing a foothold and persistent access. There are several tools that are available to help identify and exploit systemic vulnerabilities, but we will be focusing only on three of them in this chapter(OpenVAS, Nessus, Nexpose ) introduction 3
4
Basic vulnerability scanning with OpenVAS 4
5
Basic vulnerability scanning with openvas 5 OpenVAS successfully installed and configured Access to the Kali system confirm the IP address of lab network
6
Basic vulnerability scanning with openvas 6
7
Basic vulnerability scanning with openvas 7 Scans | Tasks | Task Wizard
8
Basic vulnerability scanning with openvas 8
9
9
10
10
11
Basic vulnerability scanning with openvas 11
12
Advanced vulnerability scanning with OpenVAS 12
13
advanced vulnerability scanning with openvas 13 Navigate to Configuration | Credentials
14
advanced vulnerability scanning with openvas 14 Navigate to Configuration | Targets
15
advanced vulnerability scanning with openvas 15 Navigate to Configuration | Scan Configs
16
advanced vulnerability scanning with openvas 16 The Fast and Full Scan is the configuration we used for our scan We put these three components – target, credentials, and a scan configuration together to create a task From this point deep vulnerability scan will be run
17
advanced vulnerability scanning with openvas 17 Navigate to Scans | Tasks, and click on the New Task icon From this point deep vulnerability scan will be run
18
Basic vulnerability scanning with Nessus 18
19
Basic vulnerability scanning with Nessus 19 Kali Linux is running and you are logged in as root Start the Metasploitable virtual machine Nessus is started
20
Basic vulnerability scanning with Nessus 20
21
Basic vulnerability scanning with Nessus 21
22
Basic vulnerability scanning with Nessus 22
23
Basic vulnerability scanning with Nessus 23
24
Basic vulnerability scanning with Nessus 24
25
Basic vulnerability scanning with Nessus 25
26
Basic vulnerability scanning with Nessus 26
27
Basic vulnerability scanning with Nessus 27
28
Advanced vulnerability scanning with Nessus 28
29
Advanced vulnerability scanning with Nessus 29
30
Advanced vulnerability scanning with Nessus 30
31
Advanced vulnerability scanning with Nessus 31
32
Advanced vulnerability scanning with Nessus 32
33
Advanced vulnerability scanning with Nessus 33
34
Advanced vulnerability scanning with Nessus 34
35
Basic vulnerability scanning with Nexpose 35
36
36 Basic vulnerability scanning with Nexpose Kali Linux is running use the NAT network on all VMs Start Metasploitable and Windows XP machine with the NAT network
37
37 Basic vulnerability scanning with Nexpose
38
38 Basic vulnerability scanning with Nexpose
39
39 Basic vulnerability scanning with Nexpose
40
40 Basic vulnerability scanning with Nexpose
41
41 Basic vulnerability scanning with Nexpose
42
42 Basic vulnerability scanning with Nexpose
43
43 Basic vulnerability scanning with Nexpose
44
Advanced vulnerability scanning with Nexpose 44
45
Advanced vulnerability scanning with Nexpose 45
46
Advanced vulnerability scanning with Nexpose 46
47
Advanced vulnerability scanning with Nexpose 47
48
Advanced vulnerability scanning with Nexpose 48
49
Advanced vulnerability scanning with Nexpose 49
50
conclusion In this chapitre analys ulenarability we se the technique of scaninc to find vulinablitys in the machin targert (victime),we used diffrents tools (openvas,nessus,nexpose) 50
51
T 51
Présentations similaires
© 2024 SlidePlayer.fr Inc.
All rights reserved.