In this chapter, we focused on multiple vulnerability assessment tools and techniques. We have learned how to write our own vulnerability script for nmap using NSE and also how to use a tool that can convert the findings from active reconnaissance into a defined action that establishes contact between the tester and the target.
Kali provides several tools to facilitate the development, selection, and activation of exploits, including the internal exploit-db database and several frameworks that simplify the use and management of the exploits.
The next chapter focuses on the most important part of the attacker's kill chain – the exploitation phase. Physical security is one method of gaining access to data systems (if you can boot, you've got root!); physical access is also closely tied to social engineering, the art of hacking humans and taking advantage...