Slide 1Chapter 5 Hacking Unix Last modified 2-27-09 Slide 2 Vulnerability Mapping Listing aspects of the target system and associated vulnerabilities –Online vulnerabilities…