From the course: Complete Guide to Open Source Security
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Running a vulnerability scan with GVM
From the course: Complete Guide to Open Source Security
Running a vulnerability scan with GVM
- [Narrator] Okay, before we run a scan, let's check our administration feed status, and we can see we're all current. Let's now run our first scan against the Metasploitable server. To run a scan, we select Scans, and we'll use the wizard denoted by the wand. Task Wizard to do an immediate scan of 192.168.113, which is our Metasploitable server. And we'll start the scan. In the status we can see that the scan has been requested. Okay, the scan has now been queued for action, and it started. We'll let this scan complete and then come back to it. Our scan has finished and the scan screen shows one report. We can click on the report number or date to open it. The report screen information tab shows the task name and the time taken for the scan. We can select the Results tab, and we can see we have a lot of high severity issues, starting with a Possible Backdoor, some XSS and Command Execution Vulnerabilities, Operating System End of Life, Multiple Distributed Ruby Remote Code Execution…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Open source security software2m 50s
-
(Locked)
Open source software licensing2m 22s
-
(Locked)
Installing and testing open source security tools1m 23s
-
The Proxmox virtualization system5m 23s
-
(Locked)
Installing Kali Linux6m 44s
-
(Locked)
Using the application menu5m 12s
-
(Locked)
Installing additional tools2m 4s
-
(Locked)
Introduction to the Kali Purple workstation7m 39s
-
Introduction to the Kali Purple server5m 37s
-
(Locked)
Creating a Kali Purple server template2m 37s
-
(Locked)
Software component security5m 23s
-
(Locked)
Scanning with an automated SCA tool2m 7s
-
(Locked)
-
-
(Locked)
Introduction to GRC1m 13s
-
Architecting with ArchiMate5m 52s
-
(Locked)
Modelling security with Archi2m 22s
-
(Locked)
Adding security to the model3m 27s
-
(Locked)
Security risk management with SimpleRisk3m 9s
-
(Locked)
Taking SimpleRisk for a spin7m 34s
-
(Locked)
Using eramba for GRC4m 18s
-
(Locked)
Configuring the eramba system8m 31s
-
(Locked)
Preparing your risk context9m 11s
-
(Locked)
Setting up your assets3m 15s
-
(Locked)
Entering risks into eramba3m 35s
-
(Locked)
-
-
(Locked)
A survey of open source firewalls3m 6s
-
(Locked)
The basics of firewall operation1m 54s
-
(Locked)
Installing pfSense5m 6s
-
Accessing the DMZ via pfSense5m 29s
-
(Locked)
Installing the IPFire firewall5m 17s
-
(Locked)
Up and running with IPFire2m 29s
-
(Locked)
Installing NethSecurity7m 28s
-
(Locked)
Configuring the zones3m 32s
-
(Locked)
Configuring the NethSecurity lab2m 32s
-
(Locked)
Opening up the file server3m 57s
-
(Locked)
Activating the LAN DHCP1m 30s
-
(Locked)
-
-
(Locked)
Installing the Wazuh SIEM5m 24s
-
(Locked)
Installing a Wazuh Linux agent3m 20s
-
(Locked)
Installing a Wazuh Windows agent1m 32s
-
(Locked)
Collecting Nginx logs in Wazuh5m 20s
-
(Locked)
Monitoring an attack with Wazuh4m 48s
-
(Locked)
Detecting web shells with Wazuh7m 42s
-
(Locked)
Activating vulnerability scanning3m 45s
-
(Locked)
-
-
(Locked)
Installing the ELK Stack SIEM8m 19s
-
(Locked)
Upgrading Kibana to HTTPS5m 39s
-
(Locked)
Configuring log integrations3m 48s
-
(Locked)
Installing the Fleet server2m 51s
-
(Locked)
Enrolling hosts into the Fleet server6m 58s
-
(Locked)
Enhancing your logs9m 19s
-
(Locked)
Detecting reconnaissance with the ELK Stack7m 20s
-
(Locked)
Detecting exploitation with the ELK Stack4m 56s
-
(Locked)
Monitoring alerts with the ELK Stack4m 39s
-
(Locked)
-
-
(Locked)
Installing the IRIS incident management system2m 8s
-
(Locked)
Managing incidents with IRIS5m 44s
-
(Locked)
Installing Velociraptor6m 40s
-
(Locked)
Connecting Linux hosts to Velociraptor5m
-
(Locked)
Connecting Windows hosts to Velociraptor2m 16s
-
(Locked)
Running commands remotely from Velociraptor59s
-
(Locked)
Accessing client files with VFS2m 30s
-
(Locked)
Hunting with Velociraptor5m 44s
-
(Locked)
-
-
(Locked)
Installing the Kiwi TCMS test management system2m 12s
-
(Locked)
Security testing with Kiwi TCMS8m 42s
-
(Locked)
Installing the osTicket web app5m 52s
-
(Locked)
Managing trouble tickets9m 32s
-
(Locked)
Mind mapping with Freeplane6m 57s
-
(Locked)
Introducing the Valkey datastore2m 43s
-
(Locked)
Scripting with Valkey2m 12s
-
(Locked)