Setting Up the Assessment Environment

In the last chapter, we learned about understanding the essentials of a vulnerability management program from a governance perspective. This chapter will introduce various methods and techniques for setting up a comprehensive vulnerability assessment and penetration testing environment. We will learn how to set up our own environment that could be effectively used for various vulnerability assessment techniques discussed later in the book.

We will cover the following topics in this chapter:

  • Setting up a Kali virtual machine
  • Basics of Kali Linux
  • Environment configuration and setup
  • List of tools to be used during assessment
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.202.45