Ethical Hacking – Learning the Basics

Scanning Example

Your browser needs to be JavaScript capable to view this video

Try reloading this page, or reviewing your browser settings

This segment takes you through an example on vulnerability scanning. You will perform a scan on network and one on a website as well.

Keywords

  • scanning
  • vulnerabilities
  • linux
  • opensource
  • lynis
  • kali
  • security
  • owasp
  • zap
  • proxy
  • attack
  • reports

About this video

Author(s)
Sunil Gupta
First online
18 November 2019
DOI
https://doi.org/10.1007/978-1-4842-4348-0_9
Online ISBN
978-1-4842-4348-0
Publisher
Apress
Copyright information
© Sunil Gupta 2019