Vulnerability scanning process

The vulnerability scanning process follows a basic workflow where the tester will initiate a series of scans. Each scan builds on the next, providing more information each time so that the tester builds an accurate understanding of the environment, which then leads to the actual vulnerability scan:

This is the workflow to perform a successful vulnerability scan:

  1. Device discovery: During this phase of the workflow, the tester maps out the devices that are present on the network. Additionally, the tester scans to determine the topology of the network where the devices being scanned reside:
    • Scans performed: Network ...

Get Information Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.