Vulnerability Scanner Set-Up and Configuration Part 1 Lab

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

10 hours 55 minutes
Video Transcription
Hey, everyone, welcome back to the course. So in this video, we're gonna do our first lab. As I mentioned before, we're gonna have a couple of labs where all walk you through it, step by step. And then the rest of the labs are going to have you step by step guide, which you have pictured here on the screen. But you'll want to You'll have to go through those labs yourself. So we'll walk through a couple of laps together to get your feet wet a little bit,
and then everything else should be doing on your own.
But again, there are instructions with each of these labs. There are also these downloadable, step by step guides, so you can feel free to policy videos and go through the labs at your own pace.
For all of those labs that I'm not going to be walking you through step by step, I will have an overview video just talking about what you're actually going to be doing in that particular lap.
So in this video, we're gonna cover our first lab, as I mentioned. And so what? This one, we're gonna use a vulnerability scanner called core Impact We're basically just going to launch it set up through the Wizard and then we'll run a simple scan. So it's a very, very easy lab. Pretty quick lab to do.
I shouldn't take you too long, but let's go ahead and get started. Now. I do want to mention also
that thesis. Tep by step, guides are always in the resource section of the course, so you can feel free to pause this video and go download all of those for all the labs if you haven't done so already.
So one thing I'm not going to do is I'm not going to go off this step by step guide as I go through the lab. I'm just gonna talk you through the instructions for this particular lap.
So once you loved launched a lab, you'll be taken to this screen here might take a few minutes for the lab to launch.
And one thing I want to point out before we get started is as you go through this lab to get credit for it. What you want to do is you'll want to click through the various instruction pages and make sure that you check the check boxes. You notice when I do that, it starts turning this bar down here blue. And it also gives me a percentage showing my completion
so very important. If you want to get credit for the lab, make sure that you do that
same thing with all the other labs in the course. As you go through them, make sure that you're addressing any check boxes as you complete that step. And once you finally get done, then you could end the lab, and it should. It should give you full credit.
So again, very important there. If you want to get credit, make sure you do that.
So first things first and we can just go off the instructions here in the lab. But I'm gonna be talking through him pretty quickly, So we want to go ahead and sign in and by default. It should already have the user name and therefore you. So you see here it's administrator, which we obviously know we should never really have.
And then it's got a simple passwords password, but with the at symbol and then the number zero instead of an O. So let's go ahead and type that in now, so we're just gonna type in the password. So capital Peake,
we'll put the at symbol so that in most keyboard says should be above the number two on your keyboard. Just hold down, shift and do that. They were to type in lower case S S W the number zero and then lower case R D.
Now, one thing to note is, sometimes it might go a little slow, So just be patient with it, and you'll notice eventually it should put all the characters you typed in there.
And then you can either hit and turn your keyboard or just click the arrow there to go ahead and log in to this machine.
Now, it's gonna take a few seconds or so to log in. You might get some prompts as you're logging in, for example, of Windows activation for the key. Just put acts asked me later. Just x out of that same thing here. You can x out of that box is Well, it's gonna sometimes ask you if you want to restart the computer, just say restart later.
All right? So once you've done all that, it should take you to the desktop screen here. And this is where we want to go ahead and start from. So, as I mentioned earlier, we're going to be using the vulnerability Skinner called core impact. And we're just gonna launch it here from the desktops. You should see a shortcut there from the desktop.
Just go ahead and double click that That's gonna launch the the vulnerability scanner for us.
All right, So you could see that the core impact tool has launched for us. When it first starts up, you'll get this little tip of the day showing up. If you don't want to see that every time you do this lab, then just uncheck that box and close it out there. You could look through the tips if you want. Teoh, I'm not going to in this particular lab.
So the next step we want to do if you're following along on the step by step guide or if you're following along with the instructions on the right side of the lab here is we're gonna go up to the very top left here, So we're gonna go to where it says file we're going to select the new workspace option that we're going to select the blank workspace. So this top option here
now it's gonna ask us to Neymar workspace for this lab. You really could name it. Whatever you want, I'm gonna keep it somewhat. Can grow into what you might want to name it. If you're doing a scan eso for example. I'm gonna call this one network vulnerability scan. And if you follow along with this step by step guide
as well as the instructions on the right side lab here,
you're gonna see that's the name that we're using.
Ah, the next thing I want to do is create a Pratt past phrase. So I'm just gonna put the words scanning all over case of scanning Oliver case. So if you don't know how to spell, that s C A N N i n g and all. Or keys.
All right, then we're just gonna select the finish button here
that's gonna create our new workspace for us
are someone's that's fully created here. The next thing that we're going to do is we're gonna double click where it says network information gathering on the left side. And if yours hasn't fully loaded, you just pause a video on, wait for it. Toe, toe, load all the way up.
So again we're gonna be double clicking the network information gathering option here on the left side.
And I take a second to pull up. And once it does, we're just going to select the next button
and then we're gonna select next again.
So again, we're keeping the default here, using the core impact pro.
And then we're gonna select IPTV version four and again, a lot of these air the defaults, right? So you don't really have to worry about it. We're just gonna make sure here that this is a correct i p address range we want, which this one is. But let's just check it against a guide. If you follow along there, you're going to see that I've got listed 1 92.1680 dot zero afford slash 24. So
we do say that's correct.
And we're just gonna select next there, and then finally, we're going to select the fast option
for a first scan here,
and we're just gonna say finish now. It's really think a few minutes to run the scan, so I'm gonna pause this video here and we'll pick up the scan results in the next video. So again, in this video, we just went ahead and launch core impact. And in the next video, we're gonna take a look at our scan results and go through them.
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By