官术网_书友最值得收藏!

  • Learn Penetration Testing
  • Rishalin Pillay
  • 137字
  • 2021-06-24 14:09:18

Vulnerability scanning

Once you have gathered the necessary information, it's time to start performing some additional research around the vulnerabilities that exist. Vulnerability scans are done using software such as Nessus and OpenVAS, to name a couple. Typically, a vulnerability scanner will have signatures that tie into specific vulnerabilities. Once the scanner has been run and completed, you will be presented with a report that shows all the vulnerabilities related to a specific system. Vulnerability scanners are only able to detect the known vulnerabilities; anything that is unknown will not be detected by the vulnerability scanner. Vulnerability scanners are crucial to have within your penetration testing toolkit. They often expose vulnerabilities that you might have overlooked.

Let's take a look at a few vulnerability scanners that you can use in your penetration tests.

主站蜘蛛池模板: 卓尼县| 福安市| 井研县| 个旧市| 天峨县| 六枝特区| 平武县| 南昌市| 阳高县| 育儿| 台中县| 奇台县| 莱阳市| 盐池县| 蓬莱市| 沧源| 金堂县| 枞阳县| 大理市| 靖宇县| 剑川县| 赞皇县| 铜梁县| 汾阳市| 衡阳市| 和静县| 淄博市| 贺兰县| 成武县| 新竹市| 高陵县| 闽侯县| 嘉善县| 梁山县| 临沭县| 民县| 和龙市| 蚌埠市| 桃源县| 古田县| 阳原县|