官术网_书友最值得收藏!

Scope of the scan

If we are required to perform a vulnerability assessment for a specific application's infrastructure, it is very important to identify the data transmission sources and the components involved in the end-to-end communication. This will allow the penetration tester to perform the vulnerability scan on this scope and identify vulnerabilities specific to this application. Instead, if we choose to scan the subnets or a broader range of IP addresses, we might end up highlighting unnecessary vulnerabilities, which most of the time leads to confusion during the remediation phase. For example, if we are looking to audit a web-based application, we might be looking to include a web application, application server, web server, and database server as part of the audit scope.

主站蜘蛛池模板: 安溪县| 丰宁| 正宁县| 新竹县| 天门市| 塔河县| 梅州市| 石河子市| 大埔县| 临邑县| 沁源县| 三门峡市| 明星| 东丰县| 江达县| 满城县| 金坛市| 贡觉县| 申扎县| 体育| 邯郸市| 海淀区| 高碑店市| 铁岭市| 黄冈市| 枣阳市| 保靖县| 廉江市| 商城县| 临泉县| 翁源县| 招远市| 五华县| 滨海县| 临泉县| 金塔县| 鄯善县| 安丘市| 当涂县| 连平县| 安吉县|