Time
10 hours 55 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
everyone Welcome back to the core. So in the last 30 we went ahead and launched her core impact vulnerability scanner. Again. We just named a new workspace. And then from there we went ahead and ran our first scan. So if your scans still going, go ahead and pause this video. Just wait for it to finish. Once it's finished, you should see it actually show finished here in the top right box.
00:20
In this video, we're to go ahead and take a look at our scan results so you can follow along with a step by step guide again. If you haven't watched the first video in this lab, make sure you go back and do that. You'll need that before you can actually get to the point of reading your scan results.
00:36
And, as always, the step by step guides are available in the resource section of the course. So be sure to download those if you haven't done so already.
00:43
So what we're going to do here is we're gonna select this wind file option kind of in the center of the screen, down near the bottom. And when we select that is going to give us some basic additional information about this, right? So we'll see some very, very basic information in this box down here as well as on the right side box there.
01:02
So you could take a look through that. We're not gonna do that. In particular, in this particular lab, you could see some of the data that you are finding
01:07
for these areas. Now, the other part of this lab is basically repeating the previous steps. So here, going back to file, going to new workspace and then selecting a new blank workspace and going back through the Wizard. And in this instance, you'll go back through and actually run a detailed skin.
01:27
Ah, and see what kind of results you get back in comparison to the fast scan. So let's go ahead and do that. I'm gonna go ahead and
01:34
ex out of this one, delete this one out, and we'll go ahead and pick that buck back up from a blank screen of core impact.
01:42
All right, so we're gonna start fresh here from our core impact to do the second part of this lab. Now all you have to do is actually just closed the application and relaunch it and it's going to take you back to a fresh screen because we didn't save that previous workspace.
01:53
So if you're a call from a previous instruction, she could go back through steps 9 to 15 to take a look at those if you need to. But we're basically just gonna go to file
02:02
new workspace and then a blank workspace again,
02:06
this one. I'm just gonna call it sample to for simplicity sake,
02:10
and then we'll just do a same pass phrase of scanning. Ziff, remember, we did a scanning all lower case,
02:15
and then what is? Click the finish button there.
02:17
So as before, it's going to take a moment to just kind of launch this year. You composite video until yours launches up, and then we're gonna double click or says network information gathering. It's gonna give us that wizard again. If you recall we just went next thisted time. We're gonna leave this as core impact pro, but when we run the actual scan after we make sure we select version for as well as the I P address range,
02:37
so all that stuff again should be the default should be correct.
02:40
Here we're going to select a detailed scan this time. So we before did a fast camera select detailed
02:46
one thing here after you select next. You want to make sure that you uncheck this, perform surveillance cameras fingerprinting mostly because we don't have any cameras blood in here to this virtual machine. So if you leave that check is gonna take a lot longer to run the skin. So just uncheck that box and then select finish,
03:02
and then we'll come back in Just a moment wants our scan results are
03:07
ready to go on your end of things. Feel free to pause the video while your scans running. And once it's complete, let's come back and we'll take a look at some the results together.
03:15
All right, So you noticed the scan ist finished again. The way we tell that is the obvious. Finished at the top right here. You notice a lot of the information is pretty similar, right? We see that we've gotten the wind file etcetera again. If we scroll down in this network information gathering box, we could see some of the additional data
03:31
that the detailed scan is found in this particular network. That's not a huge amount of
03:37
host that we're finding, but we do get just a just a touch more information about some of the protocols of stuff in use.
03:45
So in this lab again, all we did was run a simple skin of vulnerability scanned with court impact pro, uh, other vulnerability scanners out there will give you a little more details on particular vulnerabilities. But this one is very, very basic level in this particular lab.
04:00
So in the next video, in the next lab, we're gonna have another walk through. So another step by step walk through. And then, as I mentioned,
04:06
it's gonna move into just over the overview videos of the labs and with you actually going through them on your own, because again, one of the best ways to learn is actually actually do it. Get your hands wet in there and dirty in there and get stuff and break stuff potentially. But the good news is you're in a virtual machine, so you can't break too much. So
04:25
I look forward to see a new in the next video

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor