Week 6

On our sixth session on ethical hacking and penetration testing, our main topic was about vulnerability mapping. We were introduced to the types of vulnerability mapping and the tools that we are going to use for vulnerability mapping. Vulnerability mapping is used to scan where the vulnerabilities of a domain are. We also can exploit those vulnerabilities after the scanning process, which is why we would need to know the type of vulnerability too to make it easier for us to locate the vulnerability. Vulnerability also gives us the knowledge of why and how to avoid vulnerabilities before implementing or before we start to deploy our website. Because the security of a server is one of the most important things to be aware of in a server or on a website.

Category: Uncategorized
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>