Question: . Go to Pentest - Tools Website Vulnerability Scanner. 2 . In the Light scan box, enter the URL of the website you want to
Go to PentestTools Website Vulnerability Scanner.
In the Light scan box, enter the URL of the website you want to scan,
such as wwwgov.uk wwwtalesfromthekitchenshed.com, or
wwwyourmechanic.com.
Ensure you have selected the "Light scan" tab.
Click on the "Start scan" button.
Wait for the scan to complete.
Review the results of the scan, which will show any vulnerabilities found on
the website.
Research one of the specific vulnerabilities found in the scan results
and learn about common ways to resolve or mitigate it:
a Some resources for researching vulnerabilities and their solutions
include:
The OWASP Top Ten project,
The National Vulnerability Database NVD and
The Common Vulnerabilities and Exposures CVE
database.
b To use the CVE database:
Go to CVE.org.
In the search bar icon, enter the CVE number or a keyword
related to the vulnerability.
Review the information provided about the vulnerability,
including its description, impact, and any known solutions or
mitigations.
Create a document called webscan.
Describe the appropriate solutions to address one of the vulnerabilities
that you discovered during your website scan in step six.
For instance, if the scan results show a vulnerability with the CVE number
CVE and the vulnerability is related to a missing security patch
on a software component, the solution would be to apply the latest
security patch to the affected software component. Please note:
sometimes your scan will not provide a CVE number.
Note that this is just an example and not all vulnerabilities can be
mitigated by applying patches, and it is always recommended to consult
with experts or vendors and follow industry best practices to mitigate the
vulnerabilities.
Submit your answer as a PDF in your Dropbox folder webscan.pdf
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
