Table of contents
Step 1: Install and open Acunetix on the Windows 8 virtual machine (control machine)
Step 3: Start phpStudy with DVWA deployed in Windows 7 (target machine)
Step 4: Check the IP address of the target machine
Step 5: Exploit the Acunetix target scanner vulnerability in the control machine
Scan various vulnerabilities of target drones
1. Experimental purpose
Acunetix is a web vulnerability scanning software that can detect network security vulnerabilities. Defenders can use the software to scan for local vulnerabilities, and for attackers, the security vulnerabilities provided by the software can serve as breakthrough points in attacks.
In this experiment, you will learn how to perform vulnerability scanning with Acunetix software.
2. Experimental process
Step 1: Install and open Acunetix on the Windows 8 virtual machine (control machine)
Figure 1 Installing Acunetix on the control machine
Step 2: Open Acunetix
Figure 2 Log in to Acunetix
Figure 3 Acunetix interface
Note: The IE browser that comes with Windows 8 does not support this software. You need to modify the default browser. Firefox is used here.
Step 3: Start phpStudy with DVWA deployed in Windows 7 (target machine)
(Deployment method in network security training (1) | Using PhpStudy to deploy DVWA )
Figure 4 Starting phpStudy
Step 4: Check the IP address of the target machine
Figure 5 Check the IP address of the target machine
Note: As can be seen from the picture, the IP of the target drone is 192.168.75.157
Step 5: Exploit the Acunetix target scanner vulnerability in the control machine
Figure 6 Creating a vulnerability scanning task
3. Experimental results:
Scan various vulnerabilities of target drones
Figure 10 Vulnerability overview
Figure 11 List of vulnerabilities