This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:41:55 GMT -06:00https://www.coursehero.com/file/80172849/Performing-a-Security-Assessmentdocx/ Charles GravesITT-307Ingrid GaviriaPerforming a Security Assessment12/20/2020I first updated and upgraded my kali linuxThis study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:41:55 GMT -06:00https://www.coursehero.com/file/80172849/Performing-a-Security-Assessmentdocx/Then I installed openvas, once I did this it gave me an ip address and a password to put in so I went to that addressThis study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:41:55 GMT -06:00https://www.coursehero.com/file/80172849/Performing-a-Security-Assessmentdocx/Once I went to this website I logged into it with the password I was providedThis study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:41:55 GMT -06:00https://www.coursehero.com/file/80172849/Performing-a-Security-Assessmentdocx/This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:41:55 GMT -06:00https://www.coursehero.com/file/80172849/Performing-a-Security-Assessmentdocx/I then did a vulnerability scan on the first IP on my list which was my basic pentesting 1 boxI then waited for the scan to completeThis study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:41:55 GMT -06:00https://www.coursehero.com/file/80172849/Performing-a-Security-Assessmentdocx/Once the scan was done I opened the file I was given for the reportThis study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:41:55 GMT -06:00https://www.coursehero.com/file/80172849/Performing-a-Security-Assessmentdocx/I then did the same for the second IPThis study source was downloaded by 100000859819779 from