Book Image

Penetration Testing with BackBox

By : Stefan Umit Uygur
Book Image

Penetration Testing with BackBox

By: Stefan Umit Uygur

Overview of this book

Table of Contents (15 chapters)

Vulnerability scanning


In the previous chapter, we had the opportunity to look at how to gather information about the target environment by knowing only the domain name and we noticed that there is plenty of useful information that can be collected. So, now we know the target environment exists and is up and running. We also have further details about the domains, subdomains, registrar information, location, OS type and version, the applications running on the environment with their versions, the ports open, and so on. Now, we can begin our assessment of the vulnerabilities.

Setting up the environment

We will need to set up the environment in order to be able and ready to perform this task. We will be using the magical, free, open source tool called OpenVAS to perform this task, so let's prepare this tool and get ready.

OpenVAS is already fully installed but half configured, waiting for user instructions to complete the configuration. The only parameter missing from the configuration is the...