7SETTING UP YOUR ENVIRONMENT
To start constructing a complete vulnerability management system, you must first build the foundation. In this chapter, you’ll set up the base Linux environment for your system, install the tools you’ll use in the following chapters, and write a script to ensure all the components are regularly updated.
Setting Up the System
Your first step, of course, is to set up a Linux-based environment for the basic tools you’ll use to build your system: those tools include Nmap, OpenVAS, cve-search, and Metasploit.
For a small network, you’ll only need one CPU and 4GB of RAM. But for larger environments, ...
Get Practical Vulnerability Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.