2. Perform Vulnerability Assessment using Various Vulnerability Assessment Tools
A vulnerability assessment is an in-depth examination of the ability of a system or application, including current security procedures and controls, to withstand exploitation.
1. Vulnerability assessment using openVAS
Run the following command to load the openVAS docker.
In a browser , go to https://127.0.0.1/. OpenVAS login page appears, log in with admin/admin.
Navigate to Scans --> Tasks from the Menu bar.
If a Welcome to the scan task management! pop-up appears, close it.
Hover over wand icon and click the Task Wizard option.
The Task Wizard window appears; enter the target IP address in the IP address or hostname field (here, the target system is Windows Server 2022 [10.10.1.22]) and click the Start Scan button.
The task appears under the Tasks section; OpenVAS starts scanning the target IP address.
Wait for the Status to change from Requested to Done. Once it is completed, click the Done button under the Status column to view the vulnerabilities found in the target system.
It takes approximately 20 minutes for the scan to complete.
If you are logged out of the session then login again using credentials admin/admin.
Report: Results appear, displaying the discovered vulnerabilities along with their severity and port numbers on which they are running.
The results might differ when you perform this task.
Click on any vulnerability under the Vulnerability column to view its detailed information.
Detailed information regarding selected vulnerability appears, as shown in the screenshot.
Similarly, you can check other Reports by hovering over the Report: Results section to view other Reports regarding the vulnerabilities in the target system.
2. Vulnerability assessment using Nessus
Paid tool, industry standard.
3. Vulnerability assessment using GFI LanGuard
Windows tool
4. Nikto scanner
Nikto help
start the scan
-h specifies the targer
-Tuning scan perimenters, x specifies run all scans against the target
Finding cgi directories
saving the scan
-o filename where result will be saved
-F file type
Last updated