How Scanners Work

Scanners detect vulnerabilities in systems, but how does a scanner find the vulnerabilities? Watch this video and be able to describe six steps in the scanning process. Do scanners exploit the vulnerabilities found in a system?

Source: Virtual University,
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Friday, November 20, 2020, 8:20 AM