Skip to Main Content
The Ultimate Kali Linux Book - Second Edition
book

The Ultimate Kali Linux Book - Second Edition

by Glen D. Singh
February 2022
Intermediate to advanced content levelIntermediate to advanced
742 pages
15h 41m
English
Packt Publishing
Content preview from The Ultimate Kali Linux Book - Second Edition

Chapter 6: Performing Vulnerability Assessments

As you have learned so far, the information-gathering phase is vital for later phases of penetration testing as a cybersecurity professional. Discovering security vulnerabilities means having to focus on understanding the attack surface of your target. The attack surface is defined as all the points of entry into a system or network that a threat actor, such as a hacker, can exploit and compromise the system based on the number of security vulnerabilities that exist. As an aspiring ethical hacker and penetration tester, understanding the number of security flaws and their level of severity can help you understand which systems are easier to compromise on a network than others.

In this chapter, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Ultimate Kali Linux Book - Third Edition

The Ultimate Kali Linux Book - Third Edition

Glen D. Singh

Publisher Resources

ISBN: 9781801818933