June 24, 2013 · 7:00 PM
Why ethical hacking?
Vulnerability assesment and Enumeration are the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design. Although the process used to look for flaws varies and is highly dependent on the particular component being tested, some key principals apply to the process.
Durring this session we'll use various tools to enumerate system, user, group, version information which will be tremendously useful in our exploitation classes in the following classes
- Metasploit framework.
Download/Install Kali Linux
Download here: http://www.kali.org/downloads/
Install instruction here: http://docs.kali.org/category/installation
- sudo apt-get update
- sudo apt-get upgrade