Abstract
What makes an excellent carpenter? The most obvious answer would, of course, be excellent craftsmanship. But without the right tools, not even the world’s greatest carpenter could make a decent table. The same is true for a security tester; she needs the right tools to carry out a decent security test. These tools are, most of the time, the very same tools that a hacker would use to try to force her way into a system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Robert Svensson
About this chapter
Cite this chapter
Svensson, R. (2016). Exploiting Vulnerabilities. In: From Hacking to Report Writing. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2283-6_7
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2283-6_7
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2282-9
Online ISBN: 978-1-4842-2283-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)