Assessing Vulnerabilities
After finding potential security holes, the next step is to confirm whether they’re indeed vulnerabilities in the context of your environment. Before you test, perform some manual searching. You can research websites and vulnerability databases, such as these: Common Vulnerabilities and Exposures ( http://cve.mitre.org/cve ) US-CERT Vulnerability Notes Database ( www.kb.cert.org/vuls ) NIST National Vulnerability … Read more