• Ric Messier


If you have been following along from chapter to chapter, you now have some IP addresses for systems that are responding to connection attempts. You also have a list of ports that are open on those systems. The next thing you want to do is figure out exactly how you might be able to get into those systems. You need to know what vulnerabilities might be associated with the applications behind those ports.


Open Port Software Vendor Simple Network Management Protocol Local Vulnerability Commercial Scanner 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Ric Messier 2016

Authors and Affiliations

  • Ric Messier
    • 1
  1. 1.WinooskiUSA

Personalised recommendations