Skip to content

Details

Why ethical hacking?

See: http://nesit.org/why-ethical-hacking/

Vulnerability assesment and Enumeration are the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design. Although the process used to look for flaws varies and is highly dependent on the particular component being tested, some key principals apply to the process.

Durring this session we'll use various tools to enumerate system, user, group, version information which will be tremendously useful in our exploitation classes in the following classes

Tools covered:

  • Metasploit framework.
  • Nessus

Requirements:

Download/Install Kali Linux
Download here: http://www.kali.org/downloads/
Install instruction here: http://docs.kali.org/category/installation

Update kali

  • sudo apt-get update
  • sudo apt-get upgrade
  • msfupdate

Members are also interested in