- Network Scanning Cookbook
- Sairam Jetty
- 172字
- 2021-08-13 15:14:19
Vulnerability scanning
Once the open ports are identified on the discovered live hosts, we can perform vulnerability scanning. A vulnerability scan detects and identifies known issues of the software and tools installed on a host such as older version of software in use, vulnerable protocols enabled, and default passwords. It is difficult to perform this activity manually; hence this phase needs to be performed using automated tools that identify the open ports and try various exploits on the ports to identify whether the particular process/software using the port is vulnerable to the exploit based on the process. Some of the tools used to perform vulnerability scanning are Nessus, OpenVas, and Qualys.
The following screenshot shows a sample host scanned for vulnerabilities using OpenVas. You can see that the output shows the list of vulnerabilities the host is affected:
In this cookbook, we will further introduce you to various recipes on how to scan a host for vulnerabilities using Nessus, and how to customize these scans to obtain specific and fewer false-positive results.
- 現(xiàn)代雷達電子戰(zhàn)系統(tǒng)建模與仿真
- 基于集成學習的角反射體目標雷達識別理論與方法
- TFT-LCD原理與設計
- 網(wǎng)絡時代的電信監(jiān)管
- Android應用開發(fā)從入門到精通
- 手機故障維修技巧與實例
- 光傳輸網(wǎng)絡技術(shù):SDH與DWDM(第2版)
- 移動通信系統(tǒng)演進及3G信令
- 物聯(lián)網(wǎng)-射頻識別(RFID)核心技術(shù)教程
- Photoshop手機App界面設計實戰(zhàn)入門
- BREW進階與精通
- 水聲信道常數(shù)模盲均衡:理論、算法與仿真
- 典型開關(guān)電源電路分析與檢修
- Network Scanning Cookbook
- 果殼中的5G:新網(wǎng)絡時代的技術(shù)內(nèi)涵與商業(yè)思維