官术网_书友最值得收藏!

Vulnerability analysis

Once you have defined the threats that could lead to compromise, it's time to discover what vulnerabilities exist for those threats. In the vulnerability analysis phase, you start to discover vulnerabilities in systems and how you can act upon those by using exploits. 

Here, you will perform either active or passive analysis. Keep in mind that any failed exploits can lead to detection.

Active vulnerability analysis can consist of the following:

  • Network scanners
  • Web application scanners
  • Automated scanners

Passive vulnerability analysis can consist of the following:

  • Monitoring traffic
  • Metadata

There are many vulnerability scanners that exist today. For example, the more commonly used one is Nessus, but there are many others, such as OpenVAS, Nikto, and QualysGuard.

主站蜘蛛池模板: 江北区| 肃南| 孙吴县| 孝感市| 峨山| 多伦县| 方山县| 兴安盟| 阿拉尔市| 和平区| 马关县| 尼木县| 金沙县| 湄潭县| 水城县| 陵水| 合江县| 永定县| 铁岭市| 曲松县| 长兴县| 崇文区| 西充县| 同心县| 宜阳县| 济宁市| 梅河口市| 保亭| 天津市| 密山市| 北流市| 闻喜县| 新津县| 肥乡县| 政和县| 水富县| 六枝特区| 新河县| 通州区| 柳林县| 深圳市|