COMP6210 – Ethical Hacking and Penetration Testing Week 6
This week, I learned about vulnerability mapping. The vulnerability mapping, there are five types that are available those types are
- Design Vulnerabilities
- Implementation Vulnerabilities
- Operational Vulnerabilities
- Local Vulnerabilities
- Remote Vulnerabilities
after that, I also learn about the tools that are used in the vulnerability mapping those tools are OpenVas, Metasploit, sqlmap, burp suite.
No Comments »
RSS feed for comments on this post. TrackBack URL