From the course: Security Testing Essential Training (2022)

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Vulnerability scanning

Vulnerability scanning

- [Narrator] You've identified active hosts on the network, you've also identified the services and ports available on those hosts. So, what's next? Now, you want to check for vulnerabilities. A vulnerability is a weakness that could potentially be intentionally exploited by an attacker, or unintentionally exploited by a service or a network condition. I once performed a vulnerability scan against a switch so old that the scan caused the switch to reboot mid-scan. Because that switch connected two production networks, the monitoring system triggered an alert which resulted in a phone call with multiple people to investigate why the network was experiencing a production down outage. Now, the outage only lasted a few seconds, but the impact to the system and network administrators was both inconvenient and frustrating. Was the outage caused by an unauthorized outsider with malicious intent? Nope. It did, however, help the…

Contents