O'Reilly logo

Effective Incident Response Team, The by Brian Moeller, Julie Lucas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Tools of the Trade

The classic methods of attempting to find vulnerabilities, assess them, and create reports based on them are just as effective today as they ever were. An experienced staff member might take inventory of the system, attempt to attack it, and manually create reports of the findings. Unfortunately, this methodology is not effective in doing a comprehensive and repeatable assessment due to the human factors involved (i.e., variations).

The tools used for this work are generally targeted at different areas. We'll attempt to sort them out here and identify their most effective uses. After all, you can use a screwdriver as a chisel in some cases, but it's not always the best way to get the job done.

Network-perspective scanning ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required