Automated scanners are often utilized to detail specific flaws and suggest corrective actions for networks. This lab will introduce you to three separate scanners to help identify possible vulnerabilities within a system.
View the “Lab 4 Your Second Hack Part 2 Lab” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources. This lab utilizes the Kioptrix 2 VM, as well as your Kali.
Gain root access to the system by creating a new user and password. Using your hack as a reference, answer the following questions:
APA style is not required, but solid academic writing is expected. This assignment uses a rubric. Please review the rubric before beginning the assignment to familiarize yourself with the expectations for successful completion.You are not required to submit this assignment to LopesWrite.