Rachel Jasurda

Hi, my name is Rachel; I'm a Cybersecurity Specialist and the founder of Cybersecurity Demystify. I enjoy learning and love helping others learn the easy way. Happy Learning!

How to Make Your Windows 10 Machine Vulnerable to Attack for Vulnerability Scanning/Penetration Testing Practices

As cybersecurity threats continue to grow, organizations and individuals need to assess the security of their systems regularly. One way to do this is through vulnerability scanning. A process that helps identify weaknesses in a system that malicious actors could exploit. In this guide, we will explore how you can intentionally make a Windows 10 […]

How to Make Your Windows 10 Machine Vulnerable to Attack for Vulnerability Scanning/Penetration Testing Practices Read More »

Step by Step guide on launching an Authenticated scan in Qualys virtual appliance

Authenticated scanning involves providing credentials (such as usernames and passwords) to the scanning tool, allowing it to log in to the target systems or devices as an authorized user. This enables the scanning tool to access and collect detailed information about the target’s configuration, installed software, patches, and other system attributes that may not be

Step by Step guide on launching an Authenticated scan in Qualys virtual appliance Read More »

Step-by-Step Guide on Launching a Non-Authenticated Scan in Qualys Virtual Appliance

Non-authenticated scanning involves scanning target systems without providing any credentials. In this scenario, the scanning tool can only collect information that is accessible from outside (external) the target system, such as open ports, network services, and banner information. Non-authenticated scans are typically less intrusive and can provide a quick overview of potential vulnerabilities and exposures

Step-by-Step Guide on Launching a Non-Authenticated Scan in Qualys Virtual Appliance Read More »

How to download and install Qualys Cloud Agent in Ubuntu (Linux)

Qualys Cloud Agent allows you to gain instant, global visibility of your IT assets. It Can monitor assets that are impossible or difficult to monitor with network scanners. The Qualys Cloud Agent is lightweight and can be installed on any host such as a desktop, laptop, server, or virtualmachine. It collects data continuously about the

How to download and install Qualys Cloud Agent in Ubuntu (Linux) Read More »

Step-by-Step Guide on Installing Nessus Essentials

Nessus, developed by Tenable, is a security vulnerability scanning tool that checks for weaknesses in devices, networks, applications, operating systems, and cloud services. While Nessus is a Proprietary software, there is also a free community version. The community edition of Nessus is called Nessus Essential by Tenable. Allows users to scan up to 16 IP

Step-by-Step Guide on Installing Nessus Essentials Read More »

Step-by-Step Guide to Installing and Configuring Qualys Virtual Scanner

The Qualys Virtual Scanner Appliance enables you to maintain a perspective on security and adherence to regulations. It possesses the same scanning functionalities as the physical scanner appliance. It is a stateless resource that can be disposed of, serves as an extension of the Qualys Cloud Platform, and does not require separate management. Now that

Step-by-Step Guide to Installing and Configuring Qualys Virtual Scanner Read More »

Guide for Configuring Windows Domain Authentication Account in Qualys VMDR

Configure Windows Domain Authentication Account in Qualys VMDR: A Step-by-Step Guide Requirements for this Lab We need to create a new AD Domain user account for Qualys in the Active Directory Domain Controller named “qualys_account” and add the user to the Global administrator group. How to create an Active Directory Domain user To create a

Guide for Configuring Windows Domain Authentication Account in Qualys VMDR Read More »

How to set up Authentication for Unix (Linux) in Qualys VMDR

In your Qualys VMDR account, click the drop-down arrow at the top left and select VMDR. Click on the scans tab > Authentication. Click the New button > Operating Systems > Unix. Click the Login Credentials button on the left, as shown in the screenshot below > Create your username and password. Select Sudo as your Root Delegation

How to set up Authentication for Unix (Linux) in Qualys VMDR Read More »

CHAT