La présentation est en train de télécharger. S'il vous plaît, attendez

La présentation est en train de télécharger. S'il vous plaît, attendez

Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1.

Présentations similaires


Présentation au sujet: "Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1."— Transcription de la présentation:

1 Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1

2 plan introduction Advanced vulnerability scanning with openvas Basic vulnerability scanning with Nessus 2 3 4 5 6 7 1 8 Basic vulnerability scanning with Nexpose Basic vulnerability scanning with openvas Advanced vulnerability scanning with Nexpose Advanced vulnerability scanning with Nessus conclusion 2

3 Once access to a network has been gained and the systems within that network have been identified, the next step is establishing a foothold and persistent access. There are several tools that are available to help identify and exploit systemic vulnerabilities, but we will be focusing only on three of them in this chapter(OpenVAS, Nessus, Nexpose ) introduction 3

4 Basic vulnerability scanning with OpenVAS 4

5 Basic vulnerability scanning with openvas 5 OpenVAS successfully installed and configured Access to the Kali system confirm the IP address of lab network

6 Basic vulnerability scanning with openvas 6

7 Basic vulnerability scanning with openvas 7 Scans | Tasks | Task Wizard

8 Basic vulnerability scanning with openvas 8

9 9

10 10

11 Basic vulnerability scanning with openvas 11

12 Advanced vulnerability scanning with OpenVAS 12

13 advanced vulnerability scanning with openvas 13 Navigate to Configuration | Credentials

14 advanced vulnerability scanning with openvas 14 Navigate to Configuration | Targets

15 advanced vulnerability scanning with openvas 15 Navigate to Configuration | Scan Configs

16 advanced vulnerability scanning with openvas 16 The Fast and Full Scan is the configuration we used for our scan We put these three components – target, credentials, and a scan configuration together to create a task From this point deep vulnerability scan will be run

17 advanced vulnerability scanning with openvas 17 Navigate to Scans | Tasks, and click on the New Task icon From this point deep vulnerability scan will be run

18 Basic vulnerability scanning with Nessus 18

19 Basic vulnerability scanning with Nessus 19 Kali Linux is running and you are logged in as root Start the Metasploitable virtual machine Nessus is started

20 Basic vulnerability scanning with Nessus 20

21 Basic vulnerability scanning with Nessus 21

22 Basic vulnerability scanning with Nessus 22

23 Basic vulnerability scanning with Nessus 23

24 Basic vulnerability scanning with Nessus 24

25 Basic vulnerability scanning with Nessus 25

26 Basic vulnerability scanning with Nessus 26

27 Basic vulnerability scanning with Nessus 27

28 Advanced vulnerability scanning with Nessus 28

29 Advanced vulnerability scanning with Nessus 29

30 Advanced vulnerability scanning with Nessus 30

31 Advanced vulnerability scanning with Nessus 31

32 Advanced vulnerability scanning with Nessus 32

33 Advanced vulnerability scanning with Nessus 33

34 Advanced vulnerability scanning with Nessus 34

35 Basic vulnerability scanning with Nexpose 35

36 36 Basic vulnerability scanning with Nexpose Kali Linux is running use the NAT network on all VMs Start Metasploitable and Windows XP machine with the NAT network

37 37 Basic vulnerability scanning with Nexpose

38 38 Basic vulnerability scanning with Nexpose

39 39 Basic vulnerability scanning with Nexpose

40 40 Basic vulnerability scanning with Nexpose

41 41 Basic vulnerability scanning with Nexpose

42 42 Basic vulnerability scanning with Nexpose

43 43 Basic vulnerability scanning with Nexpose

44 Advanced vulnerability scanning with Nexpose 44

45 Advanced vulnerability scanning with Nexpose 45

46 Advanced vulnerability scanning with Nexpose 46

47 Advanced vulnerability scanning with Nexpose 47

48 Advanced vulnerability scanning with Nexpose 48

49 Advanced vulnerability scanning with Nexpose 49

50 conclusion  In this chapitre analys ulenarability we se the technique of scaninc to find vulinablitys in the machin targert (victime),we used diffrents tools (openvas,nessus,nexpose) 50

51 T 51


Télécharger ppt "Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1."

Présentations similaires


Annonces Google