This section exposes the reader to various vulnerability scanners and their purpose and functionality, as well as penetration testing, and assists in identifying security weaknesses in a system or network and how to exploit them.
Furthermore, readers will acquire experience of hands-on penetration testing techniques and methodologies by using various tools in Kali Linux 2019. The reader will be taken through all the pertinent stages, from discovering vulnerabilities on a target to exploiting various operating systems and web applications.
This section comprises the following chapters:
- Chapter 7, Working with Vulnerability Scanners
- Chapter 8, Understanding Network Penetration Testing
- Chapter 9, Network Penetration Testing - Pre-Connection Attacks
- Chapter 10, Network Penetration Testing - Gaining Access...