Overview
Students use Core Impact to enumerate a local area network and discovery vulnerable machines through a vulnerability scan. Based on the results of the vulnerability scan, students use Core Impact to conduct a penetration test against a previously identified vulnerable machine. Finally, students use the reporting mechanism built into Core Impact to create a host-based assessment outlining the entire vulnerability/penetration test process with a focus on possible remediation actions.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs