Next up
Exploitation Basics
Continuing in
Ethical Hacking – Learning the Basics
This is a preview of subscription content
Your browser needs to be JavaScript capable to view this video
Try reloading this page, or reviewing your browser settings
This segment takes you through an example on vulnerability scanning. You will perform a scan on network and one on a website as well.
Keywords
- scanning
- vulnerabilities
- linux
- opensource
- lynis
- kali
- security
- owasp
- zap
- proxy
- attack
- reports
About this video
- Author(s)
- Sunil Gupta
- First online
- 18 November 2019
- DOI
- https://doi.org/10.1007/978-1-4842-4348-0_9
- Online ISBN
- 978-1-4842-4348-0
- Publisher
- Apress
- Copyright information
- © Sunil Gupta 2019