article thumbnail

How to Perform a Vulnerability Scan in 10 Steps

eSecurity Planet

Authentication enables the scanner to get access to additional system information to conduct a more comprehensive examination of potential vulnerabilities. If the changes are considerable, it is critical to update the scanning tool’s vulnerability knowledge base with the most recent information.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

And then we publish that information free for anybody to access similar into the vein of attack. But once they get in, how do they operate, and a lot of them just use the same tools that your system administrators would use to move around the environment. What attacker has done to build a community is absolutely amazing.