The Vulnerability Reporting is crucial in conveying information and insights in today's fast-paced world. It communicates between organizational stakeholders, providing a comprehensive overview of various activities and performance metrics. Let's talk about them.
This is second post in the Vulnerability Management, a practical approach series. Buckle up and let's tackle one parameter at a time, appreciating the sheer importance of each in our quest for a foolproof strategy.
Identifying assets for scanning is the very first and most important step. The program's success depends on how well the organisation has inventoried its assets.We will discuss the must-to-have fields and some good-to-have fields for a CMDB tool.
So, whether you're a beginner seeking a comprehensive understanding of Vulnerability Management or an experienced professional looking to enhance your existing program, I invite you to join me on this journey. Together, we will navigate the intricate world of Vulnerability Management, acquiring the tools and knowledge needed to create a robust and resilient program. Post #1 of this series. #vulnerabilityManagement #vm #vulnerabilityassessment
Another attempt to share walkthrough and this time it is Avengers Blog from Try Hack Me platform. THM describes this activity as "A beginner guide to SQL and Command Injection". Deploy the target machine Deploy Q1. On the deployed Avengers machine you recently deployed, get the flag1 cookie value. NMAP Result I performed a nmap... Continue Reading →
It has been another long break but again back to writing which I like from the heart. In this post, I am going to take you through steps, which I performed to complete the task on Try Hack Me. The activity Blue has been described by THM as "this is an educational series for complete... Continue Reading →