Tuesday, July 12, 2011

Network Vulnerability Assessment work out steps

· Finding all the hosts on the network
· Fingerprinting their Operating systems
· Detecting open ports on the system
· Mapping the ports to various network services
· Detecting the version of the services running
· Mapping the service version to various discovered security vulnerabilities
· Verifying if the service on the host is actually vulnerable to an attack or
if it has been patched

No comments: