Introduction
Previously, we covered the discovery of live servers over the network along with service enumeration. Here, we will discuss what a vulnerability assessment is. A vulnerability assessment is a process in which a tester aims to determine the services running on the ports and check if they are vulnerable. Vulnerabilities when exploited can lead us to have unauthenticated access, denial of service, or information leakage. Vulnerability assessment is essential as it gives us a holistic picture of the security of the network being tested.
In this chapter, we will be checking whether services running on open ports have vulnerabilities. It is vital to know the operating system on which the service is running since it is one of the crucial factors in reconnaissance for vulnerability discovery where remote code execution is involved. The reason is that the same services on different operating systems will have different exploits due to architecture difference. Let's talk about one vulnerability...