Vulnerability Identification
Abstract
This chapter discusses the steps necessary to identify information about target systems, including information regarding operating system and version, and accessible applications. Once identified, we look at how to use this information to identify potentially exploitable vulnerabilities.
Keywords
Scanning
Banner grabbing
TCP scanning
UDP scanning
Enumeration
ICMP
Contents
Get Professional Penetration Testing, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.