Vulnerability Assessment

During a vulnerability assessment project we try to identify as many vulnerabilities as possible in all systems in scope.

This type of evaluation is mainly based on automated scanning with dedicated tools, doubled by manual validation of the identified vulnerabilities.

It is recommended to perform a vulnerability assessment before penetration testing because it will cover obvious security holes that could be easily used by pentesters to gain access.




Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s