Free Hosting Online for WorkStations

< Previous | Contents | Next >

In Summary‌


With so many factors making up the true risk of a discovered vulnerability, the pre-defined risk ratings from tool output should only be used as a starting point to determine the true risk to the overall organization.

Competently-created reports from a vulnerability assessment, when analyzed by a professional, can provide an initial foundation for other assessments, such as compliance penetration tests. As such, it is important to understand how to get the best results possible from this initial assessment.

Kali makes an excellent platform for conducting a vulnerability assessment and does not need any special configuration. In the Kali Applications menu, you will find numerous tools for vul- nerability assessments in the Information Gathering, Vulnerability Analysis, and Web Application Analysis categories. Several sites, including the aforementioned Kali Linux Tools Listing13, The Kali Linux Official Documentation14 site, and the free Metasploit Unleashed15 course provide ex- cellent resources for using Kali Linux during a vulnerability assessment.


Top OS Cloud Computing at OnWorks: