Question: To secure your systems before hackers can exploit any underlying weaknesses, it is a good idea to perform a vulnerability assessment. It s an automated
To secure your systems before hackers can exploit any underlying weaknesses, it is a good idea to perform a vulnerability assessment. Its an automated review process that provides insights into your current security state.
A vulnerability assessment report is the outcome of this review. It is your roadmap to a better state of security preparedness, laying out the unique risks you face due to the technology that underpins your organisation. It also reveals how to overcome them without completely overhauling your core business strategy. For more information visit wwwintruder.ioguidesvulnerabilityassessmentreportingabeginnersguide
In this exercise, you will use
Nessus Tool for gathering your scanned environment vulnerability information.
snipping tool to take screenshots of scan results to include in your report.
the Basic Report Template as your start.
Exercise
Step : Run a vulnerability scan
In your Kali Linux system, download and install Nessus and run a vulnerability scan against your Metasploitable VM
Step : Take some screenshots of scan results to include in your report
Step : Use the attached sample report to complete your vulnerability assessment report.
Deliverables
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
