Chapter 6: Performing Vulnerability Assessments
As you have learned so far, the information-gathering phase is vital for later phases of penetration testing as a cybersecurity professional. Discovering security vulnerabilities means having to focus on understanding the attack surface of your target. The attack surface is defined as all the points of entry into a system or network that a threat actor, such as a hacker, can exploit and compromise the system based on the number of security vulnerabilities that exist. As an aspiring ethical hacker and penetration tester, understanding the number of security flaws and their level of severity can help you understand which systems are easier to compromise on a network than others.
In this chapter, ...
Get The Ultimate Kali Linux Book - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.