Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Basic Vulnerability Identification Techniques

Premium room

Learn the basics of vulnerability identification techniques.

easy

90 min

137

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Vulnerability identification is the process of examining a target environment to identify exploitable weaknesses. These weaknesses can occur in network services, operating systems, or applications. Before you can exploit anything, you need to know what is there and what is wrong with it.

This phase is distinct from both reconnaissance and exploitation. Reconnaissance is about collecting information about the target, such as IP ranges, domain names, and publicly exposed infrastructure. Exploitation is the act of leveraging a confirmed weakness to achieve a specific outcome. Vulnerability identification sits between the two.

Flowchart showing the offensive security methodology from reconnaissance through vulnerability identification, exploitation, post-exploitation, and reporting, with vulnerability identification highlighted

An attacker who skips straight from a port scan to running an exploit is guessing. Without knowing what software a target is running, how it is configured, and what version it is at, there is no rational basis for choosing an attack path. A methodical approach to vulnerability identification removes that guesswork and gives you a clear picture of where a target is weak before you commit to an exploitation strategy.

The techniques covered here follow that methodology from start to finish. You will begin by mapping the attack surface of a target environment, then enumerate services and extract version information. From there, you will cross-reference those versions against public vulnerability databases, probe a web application for common flaw classes, and test system-level services for misconfigurations. A practical challenge at the end brings all of these techniques together against a single machine.

Learning Objectives

By the end of this room, you will be able to:

  • Explain what vulnerability identification means and where it fits in the offensive security methodology
  • Enumerate an environment's attack surface, including open ports, exposed services, and input vectors
  • Identify common vulnerability classes across networks, operating systems, and web applications
  • Use  and browser developer tools to interrogate target behaviour
  • Interpret service banners, error messages, and application responses to assess exploitability
  • Triage findings by potential impact and decide which warrant further investigation

Prerequisites

You should be comfortable with the following before starting:

  • Basic networking concepts, including /IP, ports, and the client-server model
  • Navigating the command line and running tools from a terminal
  • Common services such as , , , and

Machine Access

Launch the AttackBox using the Start AttackBox button, and the Target machine using the Start Machine button below.

Set up your virtual environment

To successfully complete this room, you'll need to set up your virtual environment. This involves starting both your AttackBox (if you're not using your VPN) and Target Machines, ensuring you're equipped with the necessary tools and access to tackle the challenges ahead.
Attacker machine
Status:Off
Target machine
Status:Off
Answer the questions below

I understanding the learning objectives and am ready learn vulnerability indenitification techniques!

Ready to learn Cyber Security?

The Basic Vulnerability Identification Techniques room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.