Kali Linux Intrusion and Exploitation Cookbook
上QQ阅读APP看书,第一时间看更新

Chapter 3. Network Vulnerability Assessment

In this chapter, we will cover the following recipes:

  • Using nmap for manual vulnerability assessment
  • Integrating nmap with Metasploit
  • Walkthrough of Metasploitable assessment with Metasploit
  • Vulnerability assessment with OpenVAS framework