Cyber Defense and Penetration Testing: Week 5 - Vulnerabilities Scanning

LoadingLoading previews...
Vulnerabilities Scanning
HTML Creative Commons: Attribution-Noncommercial-No Derivative Works 4.0
View
    Vulnerabilities Scanning
    Vulnerabilities Scanning
    1 file in this resource
    Summary: Having established the target's operating system and applications, the next task is to research security vulnerabilities. Vulnerability scanning is the process of proactively identifying vulnerabilities of computer systems on a network. During the attack/exploitation phase, a hacker can exploit those weaknesses in order to gain access to the system. It is therefore essential that these are discovered in a timely manner. Vulnerability scanning attempts to locate and identify weaknesses in the services and software running on a target machine. Many systems today can be exploited directly with little or no skill when a machine is discovered to have a known vulnerability. Vulnerability scanning is often performed automatically. Scanners use a database of known vulnerabilities to check for weaknesses on a system. Vulnerabilities associated with various network devices, servers, host operating systems and their associated network applications are often well documented, reported and patched by their vendors or by the information security community. It is important to mention that there is a difference in the severity of various vulnerabilities. Some vulnerabilities may present little opportunities for an attacker, whereas others will allow you to completely take over and control a machine with a single click of a button.
    Creators:
    Divisions: Academic > School of Computing, Engineering and Built Environment > Department of Computing
    Copyright holder: Copyright © Glasgow Caledonian University
    Viewing permissions: World
    Depositing User:
    Date Deposited: 26 Sep 2018 13:29
    Last Modified: 13 Feb 2020 12:08
    URI: https://edshare.gcu.ac.uk/id/eprint/4126

    Actions (login required)

    View Item View Item

    Toolbox

    There are no actions available for this resource.