Tools Vulnerability Scanning

Vulnerability Scanner Setup

Prereq: Have a Metasploitable2 setup for scanning. OpenVAS OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated testing, authenticated testing, various high level and low level Internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test. The scanner is accompanied by a […]

Blue Team

Analyze Endpoint Monitoring Output

OBJECTIVES COVERED Given a scenario, analyze data as part of security monitoring activities. Given a scenario, implement configuration changes to existing controls to improve security. Network-based monitoring systems can be supplemented with host-based monitoring. While host-based detection methods can also rely on signature-based matching, behavioral analytics is increasingly important to cybersecurity. As an analyst, you […]

Blue Team

Utilizing Threat Data and Intelligence – Practice Questions

Question 1 An engineer implements the Johari window to classify threats into quadrants. Which quadrant represents risks identified, but discarded? Known unknowns Known knowns Unknown knowns Unknown unknowns Solution The “unknown knowns” quadrant represents risks that are documented or identified but then disregarded or perhaps minimized in importance. Known knowns categorize any threats that are […]