OnWorks Linux and Windows Online WorkStations

Logo

Free Hosting Online for WorkStations

< Previous | Contents | Next >

11.4. Types of Attacks‌


Once the work is taking place, what are some of the specific sorts of attacks that you will be con- ducting? Each type of vulnerability29 has its own associated exploitation techniques. This section will cover the various classes of vulnerabilities that you will interact with most often.

No matter what category of vulnerability you are looking at, Kali makes these tools and exploits easy to find. The Kali menu on your graphical user interface is divided up into categories to help make the right tool easier to find. In addition, the Kali Tools website30 has comprehensive listings of the various tools available in Kali, organized by category and tagged for easy browsing. Each entry contains detailed information about the tool as well as example usage.


image

29https://www.cvedetails.com/vulnerabilities-by-types.php 30http://tools.kali.org/tools-listing‌

 

Top OS Cloud Computing at OnWorks: