O'Reilly logo

Ethical Hacking and Penetration Testing Guide by Rafay Baloch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5Vulnerability Assessment

Now that we have information on open ports, services, service version, and operating system of our target host/network, we will look for its potential vulnerabilities (weaknesses) in order to get one step closer into compromising our target (dealt with in the next chapter).

Nessus vulnerability scanner would be the prime focus of this chapter as it is one of the oldest and best vulnerability scanners in the market. We will also see its integration with Metasploit and how Nessus could be used within Metasploit to perform vulnerability assessment more effectively. Apart from that, we will also take a look at another vulnerability scanner “OpenVAS,” which is not as powerful as nessus, but is worth mentioning.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required