· Finding all the hosts on the network
· Fingerprinting their Operating systems
· Detecting open ports on the system
· Mapping the ports to various network services
· Detecting the version of the services running
· Mapping the service version to various discovered security vulnerabilities
· Verifying if the service on the host is actually vulnerable to an attack or
if it has been patched
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment