Do not end HTML shortcode tags on their own line, sometimes causes page to fail loading.
This commit is contained in:
@@ -60,7 +60,7 @@ If placing the contents into a file, you'll want to disable the colors to preven
|
||||
|
||||
#### Results
|
||||
|
||||
The output has a human readable section of results which give a description and ID for anything which is found. Suggestions are the lowest priority, with Warning and [TBD/TODO] being the more important items to correct.
|
||||
The output has a human readable section of results which give a description and ID for anything which is found. Suggestions are the lowest priority, with Found and Warning being the more important items to correct.
|
||||
|
||||
### NMap
|
||||
|
||||
@@ -113,12 +113,20 @@ nmap -A -p- --script=vuln localhost > ~/Downloads/nmap_report.txt 2>&1
|
||||
|
||||
If any vulnerabilities show up they usually come with a CVE which can be researched, such as `CVE-2007-6750`.
|
||||
|
||||
There are many reputable sites which come up when placing this in a search engine. [`cve.org`](https://www.cve.org]) is also supposed to be a good centralized repository,
|
||||
There are many reputable sites which come up when placing this in a search engine.
|
||||
{{< external-link
|
||||
text="cve.org"
|
||||
url="https://www.cve.org" >}}
|
||||
is also supposed to be a good centralized repository,
|
||||
|
||||
Here are examples for the provided ID.
|
||||
|
||||
- [https://www.suse.com/security/cve/CVE-2007-6750.html](https://www.suse.com/security/cve/CVE-2007-6750.html)
|
||||
- [https://www.cve.org/CVERecord?id=CVE-2007-6750](https://www.cve.org/CVERecord?id=CVE-2007-6750)
|
||||
- {{< external-link
|
||||
text="www.suse.com/security/cve/CVE-2007-6750.html"
|
||||
url="https://www.suse.com/security/cve/CVE-2007-6750.html" >}}
|
||||
- {{< external-link
|
||||
text="www.cve.org/CVERecord?id=CVE-2007-6750"
|
||||
url="https://www.cve.org/CVERecord?id=CVE-2007-6750" >}}
|
||||
|
||||
Most vulnerabilities are fixed by upgrading software, migrating to safer software, and by following best practices such as not exposing databases to the Internet.
|
||||
|
||||
@@ -128,7 +136,9 @@ Most vulnerabilities are fixed by upgrading software, migrating to safer softwar
|
||||
|
||||
I recommend playing with Metasploit if you have extra time so that you can learn how easy it is to penetrate an exploit once it is found with NMap.
|
||||
|
||||
- [https://www.metasploit.com/](https://www.metasploit.com/)
|
||||
- {{< external-link
|
||||
text="www.metasploit.com"
|
||||
url="https://www.metasploit.com/" >}}
|
||||
|
||||
Please be sure to test against your own machines, such as setting up a VM running an old Ubuntu LTS, starting up some services like CUPS, SSH, Apache, etc.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user