Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.
而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。
Because hackers want to find loopholes must first scan the vulnerability, so each company should be on its own network vulnerability scanning as a regular, regular process.
因为黑客若想要发现漏洞就必须先进行漏洞扫描,因此每个公司都应该将对自家网络的漏洞扫描作为一个常规的、定期的流程。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
应用推荐