官术网_书友最值得收藏!

Vulnerability scanning

Once you have gathered the necessary information, it's time to start performing some additional research around the vulnerabilities that exist. Vulnerability scans are done using software such as Nessus and OpenVAS, to name a couple. Typically, a vulnerability scanner will have signatures that tie into specific vulnerabilities. Once the scanner has been run and completed, you will be presented with a report that shows all the vulnerabilities related to a specific system. Vulnerability scanners are only able to detect the known vulnerabilities; anything that is unknown will not be detected by the vulnerability scanner. Vulnerability scanners are crucial to have within your penetration testing toolkit. They often expose vulnerabilities that you might have overlooked.

Let's take a look at a few vulnerability scanners that you can use in your penetration tests.

主站蜘蛛池模板: 哈巴河县| 剑河县| 荆门市| 宁国市| 深水埗区| 滨州市| 荆门市| 景泰县| 尉氏县| 呈贡县| 平遥县| 黄石市| 赤水市| 叶城县| 二连浩特市| 琼海市| 甘泉县| 迭部县| 乌兰县| 台中市| 宜君县| 松阳县| 湘潭市| 崇义县| 北流市| 元谋县| 若尔盖县| 六枝特区| 南召县| 和顺县| 台南市| 仙桃市| 南开区| 蕉岭县| 塔城市| 邹平县| 四会市| 永吉县| 从江县| 溧水县| 乡城县|