Vulnerability Scanner Set-Up and Configuration Part 2 Lab

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
10 hours 25 minutes
Difficulty
Beginner
CEU/CPE
11
Video Transcription
00:00
>> Hey, everyone. Welcome back to the course.
00:00
In the last video, we went ahead and launched
00:00
our core impact vulnerability scanner.
00:00
Again, we just named a new workspace.
00:00
Then from there we went ahead and ran our first scan.
00:00
If your scan is still going,
00:00
go ahead and pause this video,
00:00
just wait for it to finish.
00:00
Once it's finished, you should see it actually
00:00
show finished here in the top right box.
00:00
In this video, we're going to go ahead and take a look at
00:00
our scan results so
00:00
you can follow along with the step-by-step guide again,
00:00
if you haven't watched the first video in this lab,
00:00
make sure you go back and do that.
00:00
You'll need that before you can actually get to
00:00
the point of reading your scan results.
00:00
As always, the step-by-step guides
00:00
are available in the resource section of the course.
00:00
Be sure to download those if you haven't done so already.
00:00
What we're going to do here is we're going to select
00:00
this WIN file option
00:00
in the center of the screen down near the bottom.
00:00
When we select that, it's going to give us
00:00
some basic additional information about this.
00:00
We'll see some very basic information
00:00
in this box down here,
00:00
as well as on
00:00
the right-side box there.
00:00
You can take a look through that.
00:00
We're not going to do that
00:00
in particular, in this particular lab.
00:00
You can see some of the data that you are
00:00
finding for these areas.
00:00
Now, the other part of this lab is
00:00
basically repeating the previous steps.
00:00
Here, going back to file,
00:00
going to new workspace and then selecting
00:00
a new blank workspace and going back through the wizard.
00:00
In this instance, you'll go back through and actually run
00:00
a detailed scan and see what results
00:00
you get back in comparison to
00:00
the fast scan. Let's go ahead and do that.
00:00
I'm going to go ahead and X out of this one,
00:00
delete this one out and we'll go ahead and pick
00:00
that backup from a blank screen of core impact.
00:00
We're going to start fresh here from
00:00
our core impact to do the second part of this lab.
00:00
Now, all you have to do is actually
00:00
just close the application and relaunch it,
00:00
and it's going to take you back
00:00
to a fresh screen because we
00:00
didn't save that previous workspace.
00:00
If you recall from our previous instructions,
00:00
you can go back through steps
00:00
9-15 to take a look at those if you need to.
00:00
But we're basically just going to go to file,
00:00
new workspace and then a blank workspace again.
00:00
This one, and I'm just going to call
00:00
it sample 2 for simplicity sake.
00:00
Then we'll just do a same passphrase of scanning.
00:00
If you remember, we did a scanning
00:00
all lowercase and then
00:00
we'll just click the Finish button there.
00:00
As before, it's going to take
00:00
a moment to just launch this here.
00:00
You can pause the video until yours launches up.
00:00
Then we're going to double-click where it
00:00
says network information gathering.
00:00
It's going to give us a wizard again,
00:00
if you recall, we just went next.
00:00
This time we're going to leave this as core impact pro.
00:00
But when we run the actual scan after we make sure we
00:00
select version 4 as well as the IP address range.
00:00
All that stuff again, should be
00:00
the default it should be correct.
00:00
Here we're going to select a detailed scan this time.
00:00
Before we did a fast scan, we're going to select detail.
00:00
One thing here after you select Next,
00:00
you want to make sure that you uncheck this,
00:00
perform surveillance cameras fingerprinting,
00:00
mostly because we don't have any cameras
00:00
plugged in here to this virtual machine.
00:00
If you leave that checked,
00:00
it's going to take a lot longer to run the scan.
00:00
Just uncheck that box and then select Finish,
00:00
and then we'll come back in just a moment once
00:00
our scan results are ready to go.
00:00
On your end of things,
00:00
feel free to pause the video while your scan is running,
00:00
and once it's complete, let's come
00:00
back and we'll take a look at some
00:00
of the results together.
00:00
You notice the scan is finished again,
00:00
the way we tell that is the
00:00
obvious finished at the top right here.
00:00
You notice a lot of the information is pretty similar.
00:00
We see that we've gotten the WIN file, etc.
00:00
If we scroll down in
00:00
this network information gathering box,
00:00
we can see some of the additional data
00:00
that the detailed scan has found.
00:00
In this particular network,
00:00
that's not a huge amount of hosts that we're finding.
00:00
But we do get just a touch more information
00:00
about some of the protocols and stuff in use.
00:00
In this lab, again,
00:00
all we did was run a simple scan,
00:00
a vulnerability scan with core impact pro.
00:00
Other vulnerability scanners out there will give you
00:00
a little more details on particular vulnerabilities,
00:00
but this one is very basic level in this particular lab.
00:00
In the next video, in the next lab,
00:00
we're going to have another walk-through,
00:00
so another step-by-step walk-through,
00:00
and then as I mentioned,
00:00
it's going to move into just overview videos of
00:00
the labs with you
00:00
actually going through them on your own.
00:00
Because again, one of the best ways to
00:00
learn is actually do it.
00:00
Get your hands wet in there and dirty
00:00
in there and get stuff and break stuff potentially.
00:00
But the good news is you're in a virtual machine
00:00
so you can't break too much.
00:00
I look forward to seeing you in the next video.
Up Next