You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 2023/day25.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ This type of scan helps identify low-hanging fruit, such as unpatched systems or
27
27
Authenticated scans, on the other hand, are conducted with administrative credentials.
28
28
This allows the scanning tool to provide much more comprehensive information about potential vulnerabilities, including those that may not be easily exploitable.
29
29
30
-
In the next two days we are going to take a look at containers and network vulnerability scan, which are more specific subsets os system vulnerability scanning.
30
+
In the next two days we are going to take a look at containers and network vulnerability scan, which are more specific subsets of system vulnerability scanning.
31
31
32
32
## Why are vulnerability scans important?
33
33
@@ -59,11 +59,11 @@ IT departments usually undertake vulnerability scanning if they have the experti
59
59
60
60
Vulnerability scans are also performed by attackers who scour the Internet to find entry points into systems and networks.
61
61
62
-
Many companies have bug bountry programs, that allow enthical hackers to report vulnerabilities and gain money for that.
63
-
Usually the bug bountry programs have boundaries, e.g. they define what is allowed and what is not.
62
+
Many companies have bug bounty programs, that allow ethical hackers to report vulnerabilities and gain money for that.
63
+
Usually the bug bounty programs have boundaries, e.g. they define what is allowed and what is not.
64
64
65
-
Participating in big bounty programs must be done resposibly.
66
-
Hacking is a crime, and if you are caugh you cannot just claim that you did it for good, or that you were not going to exploit your findings.
65
+
Participating in big bounty programs must be done responsibly.
66
+
Hacking is a crime, and if you are caught you cannot just claim that you did it for good, or that you were not going to exploit your findings.
67
67
68
68
## How often should you conduct a vulnerability scan?
69
69
@@ -78,8 +78,8 @@ In penetration testing professional ethical hackers combine the results of autom
78
78
79
79
Penetration testers will also consider your environment (a significant factor in determining vulnerabilities’ true severity) and upgrade or downgrade the score as appropriate.
80
80
81
-
A scan can detect something that is vulnerability, but it cannot be actively exploited, because of the way it is incorporated into our system.
81
+
A scan can detect something that is a vulnerability, but cannot be actively exploited, because of the way it is incorporated into our system.
82
82
This makes the vulnerability a low priority one, because why fix something that presents no danger to you.
83
83
84
-
If an issue comes up in penetration testing then that means that this issue is exploitable, and probably a high priority - in the penetation testers managed to exploit it, so will the hackers.
84
+
If an issue comes up in penetration testing then that means that this issue is exploitable, and probably a high priority - if the penetration testers managed to exploit it, so will the hackers.
0 commit comments