April 2017
Intermediate to advanced
512 pages
7h 59m
English
In this chapter, we will cover the following recipes:
In this chapter, we will look at how to detect live servers and network devices over the network, and perform service fingerprinting and enumeration for information gathering. Gathering information is of the utmost importance for a successful vulnerability assessment and penetration test. Moving forward, we will run scanners to find vulnerabilities in the detected services. Along with that, ...
Read now
Unlock full access