Getting ready

The Getting ready section for this recipe is same as the Getting ready section of the Selecting a compliance scan policy section. Further, instead of using the Metasploitable virtual machine as the test setup, we are going to use the Kali Linux operating system. You can download the Kali Linux ISO from https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/. Download and unzip the package to find a .vmx file, as in the Getting ready section of Selecting a compliance scan policy section.

Use the following syntax to start the MySQL service and set a password for the default user root so that we can remotely log in to the service using the same credentials to perform the audit:

  • - service myql start

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.