How it works...

Most vulnerability scanners will operate by evaluating a number of different responses to attempt to determine whether a system is vulnerable to a specific attack. In some cases, a vulnerability scan may be as simple as establishing a TCP connection with the remote service and identifying a known vulnerable version by the banner that is self disclosed. In other cases, a complex series of probes and specially crafted requests may be sent to a remote service in an attempt to solicit responses that are unique to services that are vulnerable to a specific attack. In the example NSE vulnerability scripts provided, the vulnerability scan will actually try to exploit the vulnerability if the unsafe parameter is activated.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset