Skip to main content

Identifying Vulnerabilities

  • Chapter
  • First Online:
  • 3727 Accesses

Abstract

It’s time to start hacking away. After the test scope has been set, the test has been planned and the security tester has prepared her technical platform - then it’s time to get hacking.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.txt

  2. 2.

    http://www.hping.org/

  3. 3.

    http://mor-pah.net/software/dmitry-deepmagic-information-gathering-tool/

  4. 4.

    http://www.nta-monitor.com/wiki/index.php/Ike-scan_User_Guide

  5. 5.

    https://www.arin.net/about_us/overview.html

  6. 6.

    https://whois.icann.org/en/dns-and-whois-how-it-works

  7. 7.

    http://arstechnica.com/security/2015/08/ashley-madison-hack-is-not-only-real-its-worse-than-we-thought/

  8. 8.

    http://fusion.net/story/242502/ashley-madison-hack-aftermath/

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Robert Svensson

About this chapter

Cite this chapter

Svensson, R. (2016). Identifying Vulnerabilities. In: From Hacking to Report Writing. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2283-6_6

Download citation

Publish with us

Policies and ethics