From the course: Security Testing Essential Training (2022)
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Vulnerability scanning
From the course: Security Testing Essential Training (2022)
Vulnerability scanning
- [Narrator] You've identified active hosts on the network, you've also identified the services and ports available on those hosts. So, what's next? Now, you want to check for vulnerabilities. A vulnerability is a weakness that could potentially be intentionally exploited by an attacker, or unintentionally exploited by a service or a network condition. I once performed a vulnerability scan against a switch so old that the scan caused the switch to reboot mid-scan. Because that switch connected two production networks, the monitoring system triggered an alert which resulted in a phone call with multiple people to investigate why the network was experiencing a production down outage. Now, the outage only lasted a few seconds, but the impact to the system and network administrators was both inconvenient and frustrating. Was the outage caused by an unauthorized outsider with malicious intent? Nope. It did, however, help the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
Network discovery2m 35s
-
(Locked)
Open-source intelligence3m 23s
-
(Locked)
Network port and service identification2m 45s
-
(Locked)
Nmap demo5m 19s
-
(Locked)
Vulnerability scanning2m 42s
-
(Locked)
Determining severity2m 10s
-
(Locked)
Nessus demo7m 49s
-
(Locked)
Wireless scanning3m 32s
-
(Locked)
Wireless testing process1m 52s
-
(Locked)
Aircrack-ng demo7m 41s
-
-
-
-