官术网_书友最值得收藏!

Vulnerability analysis

Once you have defined the threats that could lead to compromise, it's time to discover what vulnerabilities exist for those threats. In the vulnerability analysis phase, you start to discover vulnerabilities in systems and how you can act upon those by using exploits. 

Here, you will perform either active or passive analysis. Keep in mind that any failed exploits can lead to detection.

Active vulnerability analysis can consist of the following:

  • Network scanners
  • Web application scanners
  • Automated scanners

Passive vulnerability analysis can consist of the following:

  • Monitoring traffic
  • Metadata

There are many vulnerability scanners that exist today. For example, the more commonly used one is Nessus, but there are many others, such as OpenVAS, Nikto, and QualysGuard.

主站蜘蛛池模板: 临朐县| 额尔古纳市| 芷江| 天峻县| 尚义县| 绥滨县| 通许县| 罗甸县| 友谊县| 遂川县| 大安市| 习水县| 九龙县| 平昌县| 江川县| 蓬溪县| 洛隆县| 勐海县| 镇雄县| 丽江市| 梓潼县| 洛扎县| 紫金县| 句容市| 临漳县| 天台县| 大城县| 阿坝县| 上犹县| 枣强县| 桐柏县| 彭水| 若尔盖县| 莱西市| 深水埗区| 兴义市| 故城县| 监利县| 博湖县| 辽阳县| 拉孜县|