Ethical Hacking (part 4.0/20): Vulnerability analysis with examples and tools

Maciej Zalwert
8 min readJun 18, 2021

Note: This article is being updated regularly. The latest update is as of 17/06/2021

Image by Soumil Kumar from Pexels

This article covers, in depth, on how cybersecurity experts should perform vulnerability analysis. You will find here an introduction to vulnerability concept, types, tools and an example of final vulnerability assessment report.

--

--

Maciej Zalwert

Data Scientist with 5+ years of broad-based experience in building data-intensive solutions for diverse industries