O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Advanced vulnerability scanning with OpenVAS

Vulnerability identification through unauthenticated network scanning is a good way to start gathering intelligence on a network, but a powerful component of this is the ability to perform more frequent, targeted scans, and this can include credentials that allow for the successful authentication to a target system for deeper level evaluations.

Features that make OpenVAS more powerful include highly configurable scan configurations, scheduled tasks, automated reporting, and alerting.

Aside from the default scan configurations that are present in the OpenVAS dashboard, it also contains some very flexible options, including scheduled scans and customized scan types. We will be looking at customized ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required