Just gather information about what you see on the network such as open ports, packet scanning
. A scan in which if you find something you right away see if you can get in
. Scanner has no password and can't actually log into the system
. You're a normal user who has a password, but trying from the inside to get past security controls
. A vulnerability scan shows a problem, but you determine is is not really a problem and can be ignored
. It's a real vulnerability, but it's not urgent
. A vulnerability scan shows no problems, but you determine there actually is a problem
.
|