O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Vulnerability Identification

In this chapter, we will cover:

  • Installing, configuring, and starting Nessus
  • Nessus – finding local vulnerabilities
  • Nessus – finding network vulnerabilities
  • Nessus – finding Linux-specific vulnerabilities
  • Nessus – finding Windows-specific vulnerabilities
  • Installing, configuring, and starting OpenVAS
  • OpenVAS – finding local vulnerabilities
  • OpenVAS – finding network vulnerabilities
  • OpenVAS – finding Linux-specific vulnerabilities
  • OpenVAS – finding Windows-specific vulnerabilities

Introduction

Scanning and identifying vulnerabilities on our targets is often considered one of the more tedious tasks by most penetration testers and ethical hackers. However, its one of the most important. This should be considered your homework ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required