Vulnerability Scanning - singirikondamani/Noted GitHub Wiki

Perform the vulnerability scanning

using the Tools :- OpenVAS, Nessus(Windows),Nmap,Nikto, metasploit

Method-1:

  1. Step: Terminal → Sudo sustart gvm-start (**admin/password)
  2. Step: Create the task wizard from the menu and assign the IP and start the scan.

Method-2:

Step: open Terminal → Sudo sustart nmap -sC --script=http-enum <0.0.0.0>

Method-3:

Step: Terminal → Sudo su → start nikto -h <0.0.0.0>

Method-4:

  1. Step: Login to the windows Machine
  2. Step: Open the browser and run the website using local IP https://localhost:8834/
  3. Step: Login using admin /password
  4. Step: Create new policy plugin and advance scan Advanced Scan
  5. Step: In the Settings tab, click DISCOVERY setting type and turn off the Ping the remote host option from the right pane.

Method-5: (Website)

1. msfconsole

  1. search http_version
  2. use auxiliary/scanner/http/http_version
  3. set RHOSTS <target_website>
  4. set RPORT 443 # For HTTPS
  5. run

Method-6:(Ip)

  1. msfconsole
  2. search scanner
  3. use auxiliary/scanner/portscan/tcp
  4. set RHOSTS <target_ip_or_range>
  5. set PORTS 1-1000
  6. run
⚠️ **GitHub.com Fallback** ⚠️