Then it studies the networkvulnerabilityscanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.
而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。
2
Because hackers want to find loopholes must first scan the vulnerability, so each company should be on its own networkvulnerabilityscanning as a regular, regular process.
IaaS providers may not allow network-based vulnerabilityscanning because they have no way of distinguishing friendly network scans from attack activity.