Chapter 7

Vulnerability Identification

Abstract

This chapter discusses the steps necessary to identify information about target systems, including information regarding operating system and version, and accessible applications. Once identified, we look at how to use this information to identify potentially exploitable vulnerabilities.

Keywords

Scanning

Banner grabbing

TCP scanning

UDP scanning

Enumeration

ICMP

Contents

Get Professional Penetration Testing, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.