Implementing tools to perform the active scanning of assets
In this section, you will learn how to set up and perform a vulnerability scan using the Kali Linux operating system. Nessus is one of the most reputable vulnerability scanners in the cybersecurity industry. During this exercise, you will learn how to set up Kali Linux as a virtual machine, install Nessus, and perform a vulnerability scan on a target system.
Important note
Do not perform any types of scans on systems and networks without legal permission.
To get started with this exercise, use the instructions given in the following sections.
Part 1 – Setting up Kali Linux
- Firstly, log in to the BIOS or UEFI of your system and ensure the virtualization feature is enabled on your processor.
- Next, you'll need a hypervisor to create virtual machines. To download Oracle VirtualBox, go to https://www.virtualbox.org/wiki/Downloads. Once it's downloaded, install it using the default settings...