Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
suMMary 313
10.5.2 Power Conservation
As mentioned in Chapter 7, when performing vulnerability audits dur-
ing non-business hours, many systems may not be available because
they are either shut down or in power-saving mode. If an active audit
is performed over a WAN link, it is unlikely that those hosts will be
awakened even with the Wake on LAN (WoL) function active. is
is because WoL can only be activated by sending a specialized packet
on the local segment directed at a particular MAC address. Remote
TCP/IP connections cannot carry this information. is leaves us
with the following choices:
Install a local scanner that can be configured to send such pack-•
ets 30 seconds prior to performing the audit of the target.
Run VM agents on the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512