Video Description

Once the GUI scan initiated in the previous video has completed, we have 109 vulnerabilities to examine. A useful feature from the perspective of defense is a detailed list of suggest remediations for the discovered vulnerabilities. Apache Tomcat is used as an example of a web app to examine for vulnerabilities. Gaining access to the virtual host manager of Tomcat opens up some critical exploit potential in the way of installing backdoors and executing arbitrary code on the IRC server. The industry standard for vulnerability, configuration and compliance assessments used by more than one million users across the globe. Nessus prevents network attacks by identifying the vulnerabilities and configuration issues that hackers use to penetrate your network. **Download Nessus from Tenable to follow along the with the course! Click below to download your free trial of Learn more about Tenable on their Cybrary channel. Click below to follow for all the latest updates: **

Course Modules

Metasploit