Vulnerabilities

  • Ric Messier
Chapter

Abstract

If you have been following along from chapter to chapter, you now have some IP addresses for systems that are responding to connection attempts. You also have a list of ports that are open on those systems. The next thing you want to do is figure out exactly how you might be able to get into those systems. You need to know what vulnerabilities might be associated with the applications behind those ports.

Keywords

Open Port Software Vendor Simple Network Management Protocol Local Vulnerability Commercial Scanner 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Ric Messier 2016

Authors and Affiliations

  • Ric Messier
    • 1
  1. 1.WinooskiUSA

Personalised recommendations