4
Ethical Hacking Vulnerability Assessments and Threat Modeling
Vulnerability scanning is typically something done by the ethical hacker or the blue team to assess where they are vulnerable and what they have to protect. That does not mean attackers, red teams, and penetration testers do not use them. However, they may just use them on a smaller and more targeted scale.
In this chapter, we will discuss vulnerability analysis, which is the final part of the reconnaissance and scanning phase, and at this juncture, systems, ports, and even services have been identified. We will assess the specific port or service to see what it is vulnerable to. Specifically, we will discuss vulnerability assessments, what role they play in ethical hacking, and ...
Get Hands-On Ethical Hacking Tactics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.