Abstract
If you have been following along from chapter to chapter, you now have some IP addresses for systems that are responding to connection attempts. You also have a list of ports that are open on those systems. The next thing you want to do is figure out exactly how you might be able to get into those systems. You need to know what vulnerabilities might be associated with the applications behind those ports.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Ric Messier
About this chapter
Cite this chapter
Messier, R. (2016). Vulnerabilities. In: Penetration Testing Basics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1857-0_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1857-0_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1856-3
Online ISBN: 978-1-4842-1857-0
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books