On our sixth session on ethical hacking and penetration testing, our main topic was about vulnerability mapping. We were introduced to the types of vulnerability mapping and the tools that we are going to use for vulnerability mapping. Vulnerability mapping is used to scan where the vulnerabilities of a domain are. We also can exploit those vulnerabilities after the scanning process, which is why we would need to know the type of vulnerability too to make it easier for us to locate the vulnerability. Vulnerability also gives us the knowledge of why and how to avoid vulnerabilities before implementing or before we start to deploy our website. Because the security of a server is one of the most important things to be aware of in a server or on a website.
Recent Comments