Identifying vulnerabilities with Nessus

This tool complements the process of identifying vulnerabilities through queries made in specialized databases. As a disadvantage of this type of automatic scanning, there are false positives, the non-detection of some vulnerabilities, and sometimes the classification of low priority to some whose exploitation allows access to the system.

With this analysis, you can observe the different vulnerabilities that could exploit any user, since they are accessible from the internet.

The report consists of an executive summary of the different existing vulnerabilities. This summary presents the different vulnerabilities ordered according to a color code based on their criticality. Each vulnerability is presented ...

Get Mastering Python for Networking and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.