Finding Vulnerabilities
Finding Vulnerabilities
Contents
Nessus
Metasploit
Manual analysis
1. Nessus
Nessus
Tenable Security’s Nessus is one of the most widely used commercial
modules. These modules will not give us control of the target machine, but
they will help us identify vulnerabilities for later exploitation
Metasploit exploit Check Functions
Some Metasploit exploits include a check function that connects to a target