**Please provide screenshots with date and time**
Understanding the basic tools needed to perform a vulnerability analysis allows a better comprehension of the technical capabilities and limitations associated with scanning technologies.
Complete the following:
·Perform a vulnerability analysis against the Kioptrix 3 VM using the techniques and programs demonstrated in the video.
·Provide screenshots and information related to vulnerabilities found on the Kioptrix 3 VM website and the Kioptrix 3 VM website page source.
·Provide screenshots of the programs/commands you used to discover vulnerabilities on the Kioptrix 3 VM. Be sure to include, at the least, the nmap, dirb, nikto, searchsploit, and OWASP ZAP execution and output.
Part 2:
Write a summary addressing the following:
·Evaluate the effectiveness of applications if they were directly related to a financial institution, government entity, or an ecommerce website in terms of cybersecurity in preventing crime and abuse.
·Describe at least five vulnerabilities discovered during your analysis of the Kioptrix 3 VM.
·Identify at least two different potential web extensions that could provide information to an attacker and describe why it is dangerous.
·Explain a defensive strategy to offset the five vulnerabilities focused on above.
We offer the best custom writing paper services. We have answered this question before and we can also do it for you.
GET STARTED TODAY AND GET A 20% DISCOUNT coupon code DISC20