- Kali Linux Intrusion and Exploitation Cookbook
- Ishan Girdhar Dhruv Shah
- 37字
- 2025-02-25 04:57:42
Chapter 3. Network Vulnerability Assessment
In this chapter, we will cover the following recipes:
- Using nmap for manual vulnerability assessment
- Integrating nmap with Metasploit
- Walkthrough of Metasploitable assessment with Metasploit
- Vulnerability assessment with OpenVAS framework