官术网_书友最值得收藏!

Scope of the scan

If we are required to perform a vulnerability assessment for a specific application's infrastructure, it is very important to identify the data transmission sources and the components involved in the end-to-end communication. This will allow the penetration tester to perform the vulnerability scan on this scope and identify vulnerabilities specific to this application. Instead, if we choose to scan the subnets or a broader range of IP addresses, we might end up highlighting unnecessary vulnerabilities, which most of the time leads to confusion during the remediation phase. For example, if we are looking to audit a web-based application, we might be looking to include a web application, application server, web server, and database server as part of the audit scope.

主站蜘蛛池模板: 大名县| 新丰县| 西华县| 广灵县| 广东省| 巩义市| 深州市| 高安市| 合作市| 玛纳斯县| 沙洋县| 太仆寺旗| 北安市| 鸡东县| 霍州市| 府谷县| 漾濞| 九龙县| 永福县| 麦盖提县| 马龙县| 吉木萨尔县| 渭南市| 中阳县| 宁武县| 辽宁省| 千阳县| 南陵县| 分宜县| 天峨县| 甘泉县| 林州市| 望奎县| 依安县| 清水县| 鹤壁市| 漠河县| 安西县| 澎湖县| 邻水| 临邑县|