- Kali Linux Intrusion and Exploitation Cookbook
- Ishan Girdhar Dhruv Shah
- 37字
- 2021-07-09 18:26:42
Chapter 3. Network Vulnerability Assessment
In this chapter, we will cover the following recipes:
- Using nmap for manual vulnerability assessment
- Integrating nmap with Metasploit
- Walkthrough of Metasploitable assessment with Metasploit
- Vulnerability assessment with OpenVAS framework