Summary
During the course of this chapter, you learned about the importance of vulnerability management and how it helps organizations to identify and resolve security weaknesses in their assets. Furthermore, you learned how to set up and use Nessus, GVM, and NSE to identify security vulnerabilities on a target.
Once a security vulnerability is found, the ethical hacker should perform additional research to determine how the vulnerability can be exploited and gain unauthorized access to the target. This means the ethical hacker can either develop exploits on their own or acquire exploits from public sources and perform testing within a simulated environment to determine the likelihood the exploit would successfully compromise the vulnerability on the target.
I hope this chapter has been informative for you and helpful in your journey into entering the cybersecurity industry. In the next chapter, Chapter 9, Delving into Website Reconnaissance, you will learn how to profile web...