Optimizing Automated Vulnerability Assessments of Remote Information Systems

Up-to-date security scanners perform vulnerability detection and identification on the basis of indirect features. Exploitation instruments (for example, Metasploit Framework), which are used for further vulnerability validation, launch exploits consequently taking into account simple criteria, such...

Full description

Bibliographic Details
Main Authors: Evgeniy Petrovich Tumoyan, Daria Alexandrovna Kavchuk
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2013-02-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/351