In the last chapter, we learned about understanding the essentials of a vulnerability management program from a governance perspective. This chapter will introduce various methods and techniques for setting up a comprehensive vulnerability assessment and penetration testing environment. We will learn how to set up our own environment that could be effectively used for various vulnerability assessment techniques discussed later in the book.
We will cover the following topics in this chapter:
- Setting up a Kali virtual machine
- Basics of Kali Linux
- Environment configuration and setup
- List of tools to be used during assessment