Optimizing Automated Vulnerability Assessments of Remote Information Systems
Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2013-02-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/351 |