21.4. Summary

Whereas Chapter 20 discussed ways to determine a network's vulnerability to attack at a fairly high level, this chapter looked at how to determine specific risks of individual Macs on your network to exploits that can take advantage of open ports (including those you may want to leave open for one reason or another). I described two major tools for checking a Mac network for vulnerability to exploits: Nessus and SAINT (along with its optional SAINTexploit tool). I then introduced you to Metasploit, a tool that lets you try known exploits on your network in order to confirm potential weaknesses.

Get Mac® Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.