Manual Vulnerability Assessments

Welcome to our hands-on laboratory session where we dive deep into the world of network scanning and vulnerability assessment! In today's lesson, we are going to explore the use of Nmap for discovering manual vulnerabilities and understanding how to analyze the scan results. Subsequently, we will delve into public exploit databases to identify available exploits for the vulnerabilities found.

Overview

Our primary goal is to acquire practical knowledge in using Nmap for vulnerability scanning and to evaluate public exploit databases for discovering potential exploits. Through this, we aim to foster an understanding of the critical role of vulnerability assessment in enhancing network security.

Key terms and descriptions

Nmap
A free and open-source utility used for network discovery and security auditing; it enables administrators to identify hosts and services on a computer network, thereby creating a "map" of the network.
Vulnerability Scanning
The systematic process of proactively identifying security vulnerabilities in a computer system, network, or application; this practice aims to determine if and where a system can be exploited, and assessments are made to mitigate or correct the flaw.
Exploit Database
A repository or collection of publicly available software exploits; these databases are often maintained by security communities and provide information on exploiting known vulnerabilities, aiding both ethical hackers and malicious actors.
Manual Inspection
The method of individually examining systems, applications, or codes to identify potential vulnerabilities; this approach is often detailed and can uncover vulnerabilities that automated scanning tools might miss.
Responsible Disclosure
A practice in cybersecurity wherein a vulnerability is disclosed only after a period that allows for the vulnerability to be patched or mitigated; this is to prevent the exploitation of the vulnerability during the time it is being fixed.