Summary
In this chapter, we focused on multiple vulnerability assessment tools and techniques.We have learnt how to write our own vulnerability script for nmap using NSE and also use tool that can converts the findings from active reconnaissance into a defined action that establishes access between the tester and the target.
Kali provides several tools to facilitate the development, selection, and activation of exploits, including the internal exploit-db
database as well as several frameworks that simplify the use and management of the exploits.
The next chapter focus on the most important part of the attacker's kill chain--the exploitation phase. Physical security is one method to gain access to data systems (if you can boot, you've got root!); physical access is also closely tied to social engineering, the art of hacking humans and taking advantage of their trust. This is the part of the attack where the attackers achieve their objective. Typical exploitation activities include horizontal...