Abstract
It’s time to start hacking away. After the test scope has been set, the test has been planned and the security tester has prepared her technical platform - then it’s time to get hacking.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Robert Svensson
About this chapter
Cite this chapter
Svensson, R. (2016). Identifying Vulnerabilities. In: From Hacking to Report Writing. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2283-6_6
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2283-6_6
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2282-9
Online ISBN: 978-1-4842-2283-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)