官术网_书友最值得收藏!

Vulnerability analysis

Once you have defined the threats that could lead to compromise, it's time to discover what vulnerabilities exist for those threats. In the vulnerability analysis phase, you start to discover vulnerabilities in systems and how you can act upon those by using exploits. 

Here, you will perform either active or passive analysis. Keep in mind that any failed exploits can lead to detection.

Active vulnerability analysis can consist of the following:

  • Network scanners
  • Web application scanners
  • Automated scanners

Passive vulnerability analysis can consist of the following:

  • Monitoring traffic
  • Metadata

There are many vulnerability scanners that exist today. For example, the more commonly used one is Nessus, but there are many others, such as OpenVAS, Nikto, and QualysGuard.

主站蜘蛛池模板: 辽中县| 越西县| 淄博市| 道真| 大名县| 张家界市| 镇平县| 邵东县| 嘉祥县| 乐都县| 天津市| 宣化县| 敦煌市| 玉龙| 克拉玛依市| 阿坝县| 金沙县| 乐清市| 察哈| 会昌县| 黑水县| 疏勒县| 德化县| 清新县| 江源县| 周至县| 普宁市| 庄河市| 嘉黎县| 婺源县| 石泉县| 肃宁县| 南汇区| 平原县| 佛教| 康定县| 新巴尔虎右旗| 临江市| 临沭县| 从化市| 保定市|