O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using Skipfish for vulnerability assessment

In this recipe, we will learn how to use Skipfish. Skipfish is entirely written in C. It is highly optimized to handle HTTP requests. Skipfish can handle 2,000 requests per second, as mentioned at http://tools.kali.org/web-applications/skipfish .

Getting ready

To step through this recipe, you will need Kali Linux running on Oracle Virtualbox and an Internet connection. No other prerequisites are required.

How to do it...

For this recipe, you need to perform the following steps:

  1. Open the terminal. To start Skipfish, you have to mention the output directory name. If the output directory does not exist, it will automatically create the directory and save the results. To start Skipfish, type the following command ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required