Chapter 3. Network Vulnerability Assessment

In this chapter, we will cover the following recipes:

  • Using nmap for manual vulnerability assessment
  • Integrating nmap with Metasploit
  • Walkthrough of Metasploitable assessment with Metasploit
  • Vulnerability assessment with OpenVAS framework