Ethical Hacking - Session 3 - Vulnerability Assessment

Details
Why ethical hacking?
See: http://nesit.org/why-ethical-hacking/
Vulnerability assesment and Enumeration are the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design. Although the process used to look for flaws varies and is highly dependent on the particular component being tested, some key principals apply to the process.
Durring this session we'll use various tools to enumerate system, user, group, version information which will be tremendously useful in our exploitation classes in the following classes
Tools covered:
- Metasploit framework.
- Nessus
Requirements:
Download/Install Kali Linux
Download here: http://www.kali.org/downloads/
Install instruction here: http://docs.kali.org/category/installation
Update kali
- sudo apt-get update
- sudo apt-get upgrade
- msfupdate

Ethical Hacking - Session 3 - Vulnerability Assessment