© Sanjib Sinha 2018
Sanjib SinhaBeginning Ethical Hacking with Kali Linuxhttps://doi.org/10.1007/978-1-4842-3891-2_10

10. Vulnerability Analysis

Sanjib Sinha1 
(1)
Howrah, West Bengal, India
 

If you take a broad view of penetration testing, the first step is information gathering, and after that, every step is closely related to the next one. In fact, all the steps fall into one broad category: exploitation. Vulnerability analysis is one aspect of exploitation; you can also use the tools in the Web Application Analysis category of Kali Linux to test for vulnerabilities. There are many other related tools, and you have already learned about a few of them, so in this chapter, you will learn about the tools in the Vulnerability Analysis category and the ...

Get Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.