Vulnerability Research and Tools

`An important part of your toolkit as an ethical hacker will be the information gathered from vulnerability research. This process involves searching for and uncovering vulnerabilities in a system and determining their nature. Additionally, the research seeks to classify each vulnerability as high, medium, or low. You or other security personnel can use this research … Read more

Using the Ethical Hacking Process

Like    practically    any    IT    or    security    project,    you    need    to    plan    your    security    testing.    It’s been    said    that action    without    planning    is    at    the    root    of    every    failure.    Strategic    and tactical    issues    in    the    ethical hacking    process    need    to    be    determined    and    agreed    upon.    To ensure    the    success    of    your    efforts,    spend time    up    front   … Read more

PENETRATION TESTING VS VULNERABILITY ASSESSMENT

There is often some confusion between penetration testing and vulnerability assessment. The two terms are related but penetration testing has more of an emphasis on gaining as much access as possible while vulnerability assessment places the emphasis on identifying areas that are vulnerable to the attack. An automated vulnerability scanner will often identify possible vulnerabilities … Read more

VULNERABILITY ASSESSMENTS

THE CHALLENGES OF VULNERABILITY ASSESSMENTS Network vulnerability assessments are widely recognized as a crucial component of network security and a key component of any overall Network Security Assessment Service. Vulnerability Assessments are performed to determine the actual security posture of a network environment. They are designed to explore whether or not a malicious attacker can … Read more