Scanners detect vulnerabilities in systems, but how does a scanner find the vulnerabilities? Watch this video and be able to describe six steps in the scanning process. Do scanners exploit the vulnerabilities found in a system?
Source: Virtual University, https://www.youtube.com/watch?v=rndOWGFishw
This work is licensed under a Creative Commons Attribution 3.0 License.