Skip to content

Commit aecac6b

Browse files
authored
Merge pull request MichaelCade#435 from lpmi-13/patch-1
2 parents 9b397f7 + f243a50 commit aecac6b

1 file changed

Lines changed: 7 additions & 7 deletions

File tree

2023/day25.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ This type of scan helps identify low-hanging fruit, such as unpatched systems or
2727
Authenticated scans, on the other hand, are conducted with administrative credentials.
2828
This allows the scanning tool to provide much more comprehensive information about potential vulnerabilities, including those that may not be easily exploitable.
2929

30-
In the next two days we are going to take a look at containers and network vulnerability scan, which are more specific subsets os system vulnerability scanning.
30+
In the next two days we are going to take a look at containers and network vulnerability scan, which are more specific subsets of system vulnerability scanning.
3131

3232
## Why are vulnerability scans important?
3333

@@ -59,11 +59,11 @@ IT departments usually undertake vulnerability scanning if they have the experti
5959

6060
Vulnerability scans are also performed by attackers who scour the Internet to find entry points into systems and networks.
6161

62-
Many companies have bug bountry programs, that allow enthical hackers to report vulnerabilities and gain money for that.
63-
Usually the bug bountry programs have boundaries, e.g. they define what is allowed and what is not.
62+
Many companies have bug bounty programs, that allow ethical hackers to report vulnerabilities and gain money for that.
63+
Usually the bug bounty programs have boundaries, e.g. they define what is allowed and what is not.
6464

65-
Participating in big bounty programs must be done resposibly.
66-
Hacking is a crime, and if you are caugh you cannot just claim that you did it for good, or that you were not going to exploit your findings.
65+
Participating in big bounty programs must be done responsibly.
66+
Hacking is a crime, and if you are caught you cannot just claim that you did it for good, or that you were not going to exploit your findings.
6767

6868
## How often should you conduct a vulnerability scan?
6969

@@ -78,8 +78,8 @@ In penetration testing professional ethical hackers combine the results of autom
7878

7979
Penetration testers will also consider your environment (a significant factor in determining vulnerabilities’ true severity) and upgrade or downgrade the score as appropriate.
8080

81-
A scan can detect something that is vulnerability, but it cannot be actively exploited, because of the way it is incorporated into our system.
81+
A scan can detect something that is a vulnerability, but cannot be actively exploited, because of the way it is incorporated into our system.
8282
This makes the vulnerability a low priority one, because why fix something that presents no danger to you.
8383

84-
If an issue comes up in penetration testing then that means that this issue is exploitable, and probably a high priority - in the penetation testers managed to exploit it, so will the hackers.
84+
If an issue comes up in penetration testing then that means that this issue is exploitable, and probably a high priority - if the penetration testers managed to exploit it, so will the hackers.
8585
See you on [Day 26](day26.md).

0 commit comments

Comments
 (0)