Chapter 4. Vulnerabilities
Little holes in the system, when exploited, can ruin the whole network, exposing sensitive information, crashing and shutting down the machines. This is all because of one tiny insufficiency in a network, software, or a device—vulnerabilities.
In this chapter, you're going to:
- Learn what vulnerabilities are and how are they found
- Understand the basics of reverse engineering and their role in network security
- Learn how a vulnerability can be detected using zANTI2
- Learn how vulnerabilities are exploited using all possible tools