O'Reilly logo

Assessing Network Security by David LeBlanc, Kevin Lam, Ben Smith

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Automated Vulnerability Detection

Vulnerability assessment tools, also known as scanners, should be part of any good penetration tester’s toolkit and should certainly be part of security management practices. In some circles, scanners have a bad name because consultants misuse them. Many people have been in the practice of running a commercial scanning tool, reformatting the results, and selling those results to customers as a penetration test. However, running a scanning tool is only the first step of conducting a thorough penetration test. To really get to the bottom of what the information means, you have to follow up. The scanner might find the initial hole, but you need to do the rest of the work yourself—for example, that share ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required