
上QQ阅读APP看书,第一时间看更新
Chapter 3. Network Vulnerability Assessment
In this chapter, we will cover the following recipes:
- Using nmap for manual vulnerability assessment
- Integrating nmap with Metasploit
- Walkthrough of Metasploitable assessment with Metasploit
- Vulnerability assessment with OpenVAS framework