O'Reilly logo

Mac® Security Bible by Joe Kissell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

21.4. Summary

Whereas Chapter 20 discussed ways to determine a network's vulnerability to attack at a fairly high level, this chapter looked at how to determine specific risks of individual Macs on your network to exploits that can take advantage of open ports (including those you may want to leave open for one reason or another). I described two major tools for checking a Mac network for vulnerability to exploits: Nessus and SAINT (along with its optional SAINTexploit tool). I then introduced you to Metasploit, a tool that lets you try known exploits on your network in order to confirm potential weaknesses.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required