How Scanners Work

Scanners detect vulnerabilities in systems, but how does a scanner find the vulnerabilities? Watch this video and be able to describe six steps in the scanning process. Do scanners exploit the vulnerabilities found in a system?




Source: Virtual University, https://www.youtube.com/watch?v=rndOWGFishw
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Friday, November 20, 2020, 8:20 AM