You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?
Which of the following are open-source vulnerability scanners?
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection
You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will you take to accomplish the task?
Each correct answer represents a complete solution. Choose two.