{"id":1186,"date":"2024-12-04T12:53:54","date_gmt":"2024-12-04T12:53:54","guid":{"rendered":"https:\/\/hackmybox.com\/?p=1186"},"modified":"2025-09-08T16:29:38","modified_gmt":"2025-09-08T16:29:38","slug":"vulnerability-management","status":"publish","type":"post","link":"https:\/\/hackmybox.com\/index.php\/2024\/12\/04\/vulnerability-management\/","title":{"rendered":"Vulnerability Management with OpenVAS"},"content":{"rendered":"<div class=\"vce-row-container\" data-vce-boxed-width=\"true\"><div class=\"vce-row vce-row--col-gap-30 vce-row-equal-height vce-row-content--top\" id=\"el-df081e3b\" data-vce-do-apply=\"all el-df081e3b\"><div class=\"vce-row-content\" data-vce-element-content=\"true\"><div class=\"vce-col vce-col--md-auto vce-col--xs-1 vce-col--xs-last vce-col--xs-first vce-col--sm-last vce-col--sm-first vce-col--md-last vce-col--lg-last vce-col--xl-last vce-col--md-first vce-col--lg-first vce-col--xl-first\" id=\"el-5688e602\"><div class=\"vce-col-inner\" data-vce-do-apply=\"border margin background  el-5688e602\"><div class=\"vce-col-content\" data-vce-element-content=\"true\" data-vce-do-apply=\"padding el-5688e602\"><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-874e24cf\" data-vce-do-apply=\"all el-874e24cf\"><p>According to ISO 27001 vulnerability management is the process of identifying and mitigating vulnerabilities within the organization\u2019s information systems in order to preserve the confidentiality, integrity, and availability of sensitive data.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-93a65bbe\" data-vce-do-apply=\"all el-93a65bbe\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 58.4961%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"599\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/iso-320x187.jpg 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/iso-480x281.jpg 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/iso-800x468.jpg 800w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/iso-1024x599.jpg 1024w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/iso-1024x599.jpg\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/iso.jpg\" data-attachment-id=\"1187\"  alt=\"\" title=\"iso\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-7eee1e5c\" data-vce-do-apply=\"all el-7eee1e5c\"><p><span style=\"font-size: 10pt;\">Source: <\/span><a href=\"https:\/\/sprinto.com\/blog\/iso-27001-vulnerability-management\/\"><span style=\"font-size: 10pt;\">https:\/\/sprinto.com\/blog\/iso-27001-vulnerability-management\/<\/span><\/a><\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-e4523d1f\" data-vce-do-apply=\"all el-e4523d1f\"><p style=\"text-align: center;\">ISO 27001 vulnerability management can be explained in 5 stages:<\/p><p><span style=\"color: #00ff00;\">1. Asset Inspection:<\/span> Understand asset security by inventorying assets and identifying those most vulnerable to threats. This may involve physical inspections, configuration reviews, and network\/log analysis.<\/p><p><span style=\"color: #00ff00;\">2. Discovery and Evaluation:<\/span> Conduct internal and external vulnerability scans using tools like Qualys or Nessus, and perform penetration tests. Vulnerabilities are scored using CVSS to prioritize based on severity.<\/p><p><span style=\"color: #00ff00;\">3. Initiate Action Plan:<\/span> Develop a tactical plan to address vulnerabilities through strategies like:<\/p><p>- Risk Acceptance: Acknowledge risks within the organization's risk appetite.<\/p><p>- Risk Transfer: Shift responsibility to other parties (e.g., contracts, insurance).<\/p><p>- Risk Mitigation: Reduce risk impact through controls (e.g., MFA, secure coding).<\/p><p>- Risk Remediation: Eliminate the risk by applying patches or making configuration changes.<\/p><p><span style=\"color: #00ff00;\">4. Verify Remediation:<\/span> Reassess the effectiveness of corrective actions, including follow-up scans to ensure vulnerabilities are addressed.<\/p><p><span style=\"color: #00ff00;\">5. Document and Review Regularly:<\/span> Maintain documentation for compliance, including asset inventories, policies, assessments, and remediation plans. Regular monitoring helps to detect and resolve recurring issues.<\/p><p><span style=\"font-size: 10pt;\">Source: <\/span><a href=\"https:\/\/sprinto.com\/blog\/iso-27001-vulnerability-management\/\"><span style=\"font-size: 10pt;\">https:\/\/sprinto.com\/blog\/iso-27001-vulnerability-management\/<\/span><\/a><\/p><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-b977e076\" data-vce-do-apply=\"all el-b977e076\"><h2 style=\"text-align: center;\"><span style=\"color: #00ff00;\">Greenbone OpenVAS<\/span><\/h2><p>OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level and low-level internet and industrial protocols, performance tuning for large-scale scans and a powerful internal programming language to implement any type of vulnerability test.<\/p><p>The scanner obtains the tests for detecting vulnerabilities from a feed that has a long history and daily updates.<\/p><p>OpenVAS has been developed and driven forward by the company Greenbone since 2006. As part of the commercial vulnerability management product family Greenbone Enterprise Appliance, the scanner forms the Greenbone Community Edition together with other open-source modules.<\/p><p>Source : <a href=\"https:\/\/www.openvas.org\/\">https:\/\/www.openvas.org\/<\/a><\/p><p>1.To install, issue the command: <code>sudo apt-get install gvm &amp;&amp; openvas<\/code>.<\/p><p>&nbsp;<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-042d0660\" data-vce-do-apply=\"all el-042d0660\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 32.9102%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"337\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install1-e1733303387953-1024x338.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install1-e1733303387953-320x106.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install1-e1733303387953-480x158.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install1-e1733303387953-800x264.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install1-e1733303387953-1024x338.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install1-e1733303387953.png\" data-attachment-id=\"1192\"  alt=\"\" title=\"install1\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-536ac663\" data-vce-do-apply=\"all el-536ac663\"><p>2. Next, enter the command: <code>sudo gvm-setup<\/code>. Please note that it may take a few minutes to download the required files.\"<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-26454049\" data-vce-do-apply=\"all el-26454049\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 56.8359%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"582\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install2-1024x582.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install2-320x182.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install2-480x273.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install2-800x455.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install2-1024x582.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install2.png\" data-attachment-id=\"1193\"  alt=\"\" title=\"install2\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-raw-html\"><div class=\"vce-raw-html-wrapper\" id=\"el-1a224989\" data-vce-do-apply=\"all el-1a224989\"><script async=\"\" src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1499161372675368\" crossorigin=\"anonymous\"><\/script>\n<ins class=\"adsbygoogle\" style=\"display:block\" data-ad-format=\"fluid\" data-ad-layout-key=\"-c2+73+2h-1m-4u\" data-ad-client=\"ca-pub-1499161372675368\" data-ad-slot=\"8728040126\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-bd447c4e\" data-vce-do-apply=\"all el-bd447c4e\"><p>3. Finally, issue the command: <code>sudo gvm-start<\/code>.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-c87e0ffb\" data-vce-do-apply=\"all el-c87e0ffb\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 989px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 69.1608%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"989\" height=\"684\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install3-320x221.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install3-480x332.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install3-800x553.png 800w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/install3-989x684.png 989w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/install3-989x684.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install3.png\" data-attachment-id=\"1194\"  alt=\"\" title=\"install3\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-81382f78\" data-vce-do-apply=\"all el-81382f78\"><p>4. To access the console, browse to <code>127.0.0.1:9932<\/code><\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-63a7e6ef\" data-vce-do-apply=\"all el-63a7e6ef\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 56.25%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"576\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install5-1024x576.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install5-320x180.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install5-480x270.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install5-800x450.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install5-1024x576.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/install5.png\" data-attachment-id=\"1195\"  alt=\"\" title=\"install5\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-18d517b8\" data-vce-do-apply=\"all el-18d517b8\"><p>5. To start the scan, click on<span style=\"color: #00ff00;\"> \"Task Wizard\"<\/span> and then enter the IP address of the machine.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-2494bc4c\" data-vce-do-apply=\"all el-2494bc4c\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 56.25%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"576\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/taskwiz-1024x576.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/taskwiz-320x180.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/taskwiz-480x270.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/taskwiz-800x450.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/taskwiz-1024x576.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/taskwiz.png\" data-attachment-id=\"1197\"  alt=\"\" title=\"taskwiz\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-700291a1\" data-vce-do-apply=\"all el-700291a1\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 874px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 48.2838%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"874\" height=\"422\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-e1733307760137-320x155.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-e1733307760137-480x232.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-e1733307760137-800x386.png 800w, https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/scan-e1733307760137-874x422.png 874w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2025\/09\/scan-e1733307760137-874x422.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-e1733307760137.png\" data-attachment-id=\"1199\"  alt=\"\" title=\"scan\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-f232423c\" data-vce-do-apply=\"all el-f232423c\"><p>6. To scan with credential privileges, select <span style=\"color: #00ff00;\">\"Targets\"<\/span> under configuration tab.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-b23a21bf\" data-vce-do-apply=\"all el-b23a21bf\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 25.7812%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"264\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/target-e1733307902116-1024x264.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/target-e1733307902116-320x83.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/target-e1733307902116-480x124.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/target-e1733307902116-800x206.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/target-e1733307902116-1024x264.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/target-e1733307902116.png\" data-attachment-id=\"1200\"  alt=\"\" title=\"target\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-e90e5783\" data-vce-do-apply=\"all el-e90e5783\"><p>7. Create a new target. Here, you can click <span style=\"color: #00ff00;\">\"Elevate privileges\"<\/span> for authenticated checks.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-682c6ef0\" data-vce-do-apply=\"all el-682c6ef0\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 53.2227%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"545\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-target-1024x545.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-target-320x170.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-target-480x256.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-target-800x426.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-target-1024x545.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-target.png\" data-attachment-id=\"1202\"  alt=\"\" title=\"new target\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-04904c2c\" data-vce-do-apply=\"all el-04904c2c\"><p>8. After the target is created, create a <span style=\"color: #00ff00;\">\"New Task\"<\/span> by going on Scans Tab\".<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-d4ad2f77\" data-vce-do-apply=\"all el-d4ad2f77\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 53.2227%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"545\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-task1-1024x545.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-task1-320x170.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-task1-480x256.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-task1-800x426.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-task1-1024x545.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/new-task1.png\" data-attachment-id=\"1205\"  alt=\"\" title=\"new task1\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-bc19dc49\" data-vce-do-apply=\"all el-bc19dc49\"><p>9. Note that the following options are NOT available on the Community Edition: <span style=\"color: #00ff00;\">Full and Fast Ultimate, Full and Very Deep, and Full and Very Deep Ultimate<\/span>, as they are only available on the paid version.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-8119c69d\" data-vce-do-apply=\"all el-8119c69d\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 54.3945%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"557\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-config-1024x558.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-config-320x174.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-config-480x261.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-config-800x436.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-config-1024x558.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/scan-config.png\" data-attachment-id=\"1207\"  alt=\"\" title=\"scan config\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-72fe7fd6\" data-vce-do-apply=\"all el-72fe7fd6\"><p>10. Finally you can view the<span style=\"color: #00ff00;\"> Result, Reports &amp; Vulnerabilities<\/span> under Scan Tab.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-317818b7\" data-vce-do-apply=\"all el-317818b7\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 56.25%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"576\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/vuln2-1024x576.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/vuln2-320x180.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/vuln2-480x270.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/vuln2-800x450.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/vuln2-1024x576.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/vuln2.png\" data-attachment-id=\"1210\"  alt=\"\" title=\"vuln2\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-bf15b149\" data-vce-do-apply=\"all el-bf15b149\"><p>11. View the vulnerability details and solutions.<\/p><\/div><\/div><div class=\"vce-single-image-container vce-single-image--align-left\"><div class=\"vce vce-single-image-wrapper\" id=\"el-7ca09315\" data-vce-do-apply=\"all el-7ca09315\"><figure><div class=\"vce-single-image-figure-inner\" style=\"width: 1024px;\"><div class=\"vce-single-image-inner vce-single-image--absolute\" style=\"width: 100%; padding-bottom: 56.25%;\"><img loading=\"lazy\" decoding=\"async\" class=\"vce-single-image\"  width=\"1024\" height=\"576\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/solution-1024x576.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/solution-320x180.png 320w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/solution-480x270.png 480w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/solution-800x450.png 800w\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/solution-1024x576.png\" data-img-src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/12\/solution.png\" data-attachment-id=\"1213\"  alt=\"\" title=\"solution\" \/><\/div><\/div><figcaption hidden=\"\"><\/figcaption><\/figure><\/div><\/div><div class=\"vce-text-block\"><div class=\"vce-text-block-wrapper vce\" id=\"el-0ff79cd6\" data-vce-do-apply=\"all el-0ff79cd6\"><p><span style=\"color: #00ff00;\">Final Thoughts:<\/span> Honestly, I'm expecting more results and vulnerabilities, but since deep scans are not available in the Community Edition, I hope to get some hands-on experience with their Enterprise Edition.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>According to ISO 27001 vulnerability management is the process of identifying and mitigating vulnerabilities within the organization\u2019s information systems in order to preserve the confidentiality, integrity, and availability of sensitive data.Source: https:\/\/sprinto.com\/blog\/iso-27001-vulnerability-management\/ISO 27001 vulnerability management can be explained in 5 stages:1. Asset Inspection: Understand asset security by inventorying assets and identifying those most vulnerable to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2015,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","prose-style":"enable","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1186","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability-assessment"],"_links":{"self":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/comments?post=1186"}],"version-history":[{"count":13,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1186\/revisions"}],"predecessor-version":[{"id":2069,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/1186\/revisions\/2069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media\/2015"}],"wp:attachment":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media?parent=1186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/categories?post=1186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/tags?post=1186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}