addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgooglegroupsimageimagesinstagramlinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1outlookpersonJoin Group on CardStartprice-ribbonImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruseryahoo

Ethical Hacking - Session 3 - Vulnerability Assessment

  • Jun 24, 2013 · 7:00 PM

Why ethical hacking?


Vulnerability assesment and Enumeration are the process of discovering flaws in systems and applications which can be leveraged by an attacker. These flaws can range anywhere from host and service misconfiguration, or insecure application design. Although the process used to look for flaws varies and is highly dependent on the particular component being tested, some key principals apply to the process.

Durring this session we'll use various tools to enumerate system, user, group, version information which will be tremendously useful in our exploitation classes in the following classes

Tools covered:
- Metasploit framework.
- Nessus


Download/Install Kali Linux
Download here:
Install instruction here:

Update kali
- sudo apt-get update
- sudo apt-get upgrade
- msfupdate

Join or login to comment.

  • john

    I have my CEH from last year still I could teach classes =)

    June 24, 2013

    • William

      You should! Im sure there's stuff you know, that we don't and vise versa.

      June 24, 2013

  • john

    Your sentence should read like this:

    Tools covered:
    - Metasploit framework- Does the work for you....
    - Nessus - Doesn't do the exploiting for you, but still does all the discovering of a server for you....

    You don't even need to be smart now adays to hack an enterprise system, makes me feel like years of studying security were for nothing when there's now programs to literally hack for you, I declare[masked] the year of the "Hackers who didn't want to do anything for them selves but still want the credit (looking at everyone EXCEPT the programmers who made this software)

    June 24, 2013

    • john

      ll = ALL

      June 24, 2013

    • William

      GUI is well and fine, but for mass consumption it's better to start with CLI. Its not hard, search, use, show option, back. And it makes running your own metasploit modules simple.

      June 24, 2013

1 went

Our Sponsors

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy