Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
164
2.
Port scanning
3.
Operating system, service, and version detection
4.
Matching the results to a vulnerability database
The
Host Discovery
280
tells the scanner if the target is up and responding. The scanner then uses
various techniques to identify all open ports on the system and detect
all remotely accessible
services with corresponding versions. In addition, operating system detection will be done in this
step. Based on all gathered information, the vulnerability scanner will
then query a vulnerability
database to match the found data to vulnerabilities. Examples for vulnerability databases are the
National Vulnerability Database
281
and the
Common Vulnerabilities and Exposures
(CVE)
program.
282
Most commercial vulnerability scanners also have the functionality to verify
found vulnerabilities by attempting to partially or fully exploit them. This can
significantly reduce missed vulnerabilities but can impact the stability of the
service or system.
Vulnerabilities are identified by the CVE system.
283
While this allows us to identify and find verified
vulnerabilities, the CVE identifier provides no information about the severity of a vulnerability.
The
Common Vulnerability Scoring System
(CVSS)
284
is
a framework for addressing
characteristics and severity of vulnerabilities. Each CVE has a CVSS score assigned. The two
major versions are CVSS v2
285
and CVSS v3.
286
Both versions use a range from 0 to 10 to rate
vulnerabilities with different severity labels. The
following figure from the
Yüklə
Dostları ilə paylaş: