Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this next video in the series of why sites get hacked, we take a deeper look into enumeration. After the network terrain has been mapped out, we need to begin probing for vulnerabilities. This is accomplished in two ways: manually and automatically via scanning. We discuss various manual methods along with several automated tools such as Nessus, Armitage, and Searchploit.