O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Network Vulnerability Assessment

In this chapter, we will cover the following recipes:

  • Using nmap for manual vulnerability assessment
  • Integrating nmap with Metasploit
  • Walkthrough of Metasploitable assessment with Metasploit
  • Vulnerability assessment with OpenVAS framework

Introduction

Previously, we covered the discovery of live servers over the network along with service enumeration. Here, we will discuss what a vulnerability assessment is. A vulnerability assessment is a process in which a tester aims to determine the services running on the ports and check if they are vulnerable. Vulnerabilities when exploited can lead us to have unauthenticated access, denial of service, or information leakage. Vulnerability assessment is essential as ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required