O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

What is vulnerability assessment

Vulnerability assessment is the activity of mapping network services and versions against publically available exploits. It is non-intrusive but based on actively gathered information and correlated with the available range of exploits based on different versions.

Vulnerability assessment can be performed on web applications, network protocols, network applications, network devices, and servers anywhere on the cloud or in premises. At times, vulnerability assessment is what is needed as the employer, organization, or client may not be ready for penetration testing as they fear breaking systems or loosing data, or both due to penetration testing.

It is worth noting that vulerability assessment is not actual exploitation, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required