Difference: CisLab52014 (4 vs. 5)

Revision 52014-03-07 - JimSkon

Line: 1 to 1
META TOPICPARENT name="ComputerInformationSecurity2014"

Lab 5 - Introduction to penetration testing using Kali Linux


Line: 51 to 51
  1. Now try USCAN as above. Do some research, and explain the meaning and value of what you find.
  2. Finally try the same with FUZZ. What is FUZZ testing? What weaknesses did you find on the servers?

Step 4 - Vulnerability Assessment - Choose your own

In Chapter 3 of the Kali Text, there are write-ups on the following Vulnerability Assessment Tools:
  1. Skipfish
  2. ProxyStrike
  3. Vega
  4. Owasp-Zap
  5. Websploit

Select two of the tools. Work through the steps for using the tool, and try it out on the Windows 2008 server, Metasploitable, cs.mvnu.edu, shc.edu.bz servers. Write up your work in each, and include screens shots to demonstrate the operation.

META FILEATTACHMENT attachment="Web_Penetration_Testing_with_Kali_Linux.pdf" attr="" comment="Web Penetration Testing with Kali" date="1393740991" name="Web_Penetration_Testing_with_Kali_Linux.pdf" path="Web_Penetration_Testing_with_Kali_Linux.pdf" size="21193721" user="JimSkon" version="1"
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback