Link 1: http://www.youtube.com/watch?v=a08m53W3xUw
Link 2: http://www.youtube.com/watch?v=4sKFKNyMw8Y
Well in this video demonstrator uses thre very basic and famous tools. NMAP, NESSUS & METASPLOIT.
Nmap is used to scan network range and then save those scanned ipa ddresses in a text file.
After saving a text file which contains ip addresses of those machines who are currently up and running. He load text file in nessus to find vulnerabilities in any machine, if their is. Nessus has a database which containing lots of vulnerability signatures in his database.
At the end Nessus will bulid a HTML based report which contains list of all the vulnerabilities if found in any machine.
At last Metasploit is used to exploit a respective machine...
No comments:
Post a Comment