The vulnerability scanning process follows a basic workflow where the tester will initiate a series of scans. Each scan builds on the next, providing more information each time so that the tester builds an accurate understanding of the environment, which then leads to the actual vulnerability scan:
This is the workflow to perform a successful vulnerability scan:
- Device discovery: During this phase of the workflow, the tester maps out the devices that are present on the network. Additionally, the tester scans to determine the topology of the network where the devices being scanned reside:
- Scans performed: Network ...