官术网_书友最值得收藏!

Scope of the scan

If we are required to perform a vulnerability assessment for a specific application's infrastructure, it is very important to identify the data transmission sources and the components involved in the end-to-end communication. This will allow the penetration tester to perform the vulnerability scan on this scope and identify vulnerabilities specific to this application. Instead, if we choose to scan the subnets or a broader range of IP addresses, we might end up highlighting unnecessary vulnerabilities, which most of the time leads to confusion during the remediation phase. For example, if we are looking to audit a web-based application, we might be looking to include a web application, application server, web server, and database server as part of the audit scope.

主站蜘蛛池模板: 赤峰市| 石狮市| 恩平市| 新昌县| 偏关县| 安图县| 文登市| 河间市| 松原市| 上杭县| 高清| 昌黎县| 阿坝| 卢湾区| 屯门区| 平昌县| 桓台县| 涿鹿县| 江永县| 中阳县| 河源市| 金平| 山西省| 涟源市| 锡林浩特市| 镇安县| 呼和浩特市| 开远市| 贡山| 东丰县| 武宁县| 阿图什市| 微山县| 井研县| 若尔盖县| 磴口县| 西丰县| 宜宾市| 呈贡县| 云南省| 张掖市|