Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
162
invaluable in later stages of the engagement. We then focused on how to actively scan and
enumerate services that are commonly exposed. We learned how to perform these enumeration
steps from both Kali Linux and a Windows client.
There is never one “best”
tool for any given situation, especially since many tools in Kali Linux
overlap in function. It’s always best to familiarize ourselves with as many tools as possible, learn
their nuances, and whenever possible, measure the results to understand what’s
happening
behind the scenes. In some cases, the “best” tool is the one held by the pentester who is most
familiar with.
Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
163
7
Vulnerability Scanning
In this Learning Module, we will cover the following Learning Units:
•
Vulnerability Scanning Theory
•
Vulnerability Scanning with Nessus
•
Vulnerability Scanning with Nmap
The discovery of vulnerabilities is an integral part of any security assessment. The process of
identifying the attack
surface of a piece of software, system, or network is called
Yüklə
Dostları ilə paylaş: