O'Reilly logo

Professional Penetration Testing by Thomas Wilhelm

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11. Vulnerability Verification

Introduction

Ломать – не строить. – Russian proverb: “It is easier to pull down than to build.”
In Chapter 10 we did things the hard way – we ran everything manually, and did Internet queries to find potential vulnerabilities. This knowledge will help us better understand the next step – vulnerability verification. One of the bigger problems in understanding the state of security within a system or a network is finding out which vulnerabilities are real and which ones are false positives. This step removes any doubt.
So, how does this section fit into the prevalent methodologies? As mentioned earlier, Part 2 of this book is closely aligned with the Information System Security Assessment ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required