In this video from our Exploitation with Armitage online course your instructor and our long-time collaborator, Paul Janes, goes through scanning an OWASP vulnerable machine with Nessus. The video, despite being recorded a couple of years ago, shows universal techniques and tools, so just get in and get scanning!
The course will introduce students to Armitage using five vulnerable machines (Windows XP, Windows 7, OWASP, BEE-BOX, and Metasploitable 2) which will be utilized for the purpose of testing our scanning and exploitation. It will also introduce the students to Tenable’s Nessus Vulnerability Scanner, Zaproxy, and OpenVAS. Finally, it will make use of the information gathered in order to implement exploits using Armitage.
What will you learn?
- Awareness of Armitage and what it is used for
- Awareness of 5 vulnerable virtual machines
- Awareness of multiple vulnerability scanners
What skills will you gain?
- Ability to use Armitage to scan and exploit systems
- Ability to scan for vulnerabilities using Nessus, Zaproxy, and OpenVAS
- Ability to use Kali Linux 2
What will you need?
- 4gb RAM,
- 1 gigahertz (GHz) or faster x86-bit or x64-bit processor,
- 50GB disk space
What should you know before you join?
- How to use VMPlayer
- How to use Nessus
- Kali Linux 2 knowledge
- Basic Linux commands
Paul Janes CISSP, GIAC GISP is President of CoreTriad, LLC, a locally owned company that specializes in vulnerability assessments for small businesses and develops online training for cybersecurity professionals. He is a subject matter expert most recently involved in the development of an accredited Cyber First Responder Certification and is a speaker for industry security conferences.
Paul has over 19 years experience in IT Security at a local Fortune 500. Areas of expertise include Vulnerability Assessments, Penetration Tests, (DLP) Data Loss Prevention, Risk Management, Project Management, and Server Management.
Paul graduated with distinction from Capella University with a Master’s degree in Information Assurance and holds a Bachelor’s degree in Computer and Information Studies from Syracuse University.
[custom-related-posts title="Related content:" none_text="None found" order_by="title" order="ASC"]
- BlogApril 7, 2022Detecting Fake Images via Noise Analysis | Forensics Tutorial [FREE COURSE CONTENT]
- BlogMarch 2, 2022Windows File System | Windows Forensics Tutorial [FREE COURSE CONTENT]
- BlogAugust 17, 2021PowerShell in forensics - suitable cases [FREE COURSE CONTENT]
- OpenMay 20, 2021Photographic Evidence and Photographic Evidence Tampering