machines settings

Name two vulnerabilities found by Nessus that you would not attack and why. Explain why Nessus is only one step to finding vulnerabilities and how it may be inaccurate.

CYB 362 – Vulnerability Analysis Hands-on Assignment Objective  The objective of this lab is to gain experience in vulnerability analysis. Prerequisites Laptop with internet connectivity Virtual environment One metasploitable machine One Kali machine Lab Setup Go to https://www.tenable.com/try and sign up for a nessus trial Go to the email you signed up with and copy […]

Scroll to top