Learn Penetration Testing by Rishalin Pillay

Learn Penetration Testing by Rishalin Pillay

Author:Rishalin Pillay
Language: eng
Format: epub
Tags: COM000000 - COMPUTERS / General, COM082000 - COMPUTERS / Bioinformatics, COM006000 - COMPUTERS / Buyer
Publisher: Packt Publishing
Published: 2019-05-30T09:06:35+00:00


Figure 16: Initiating the scanner functionality

There are two types of scans that can be performed, active and passive. The following details the difference between the two:

Passive scan: This type of scan simply analyzes and detects vulnerabilities in the contents of existing requests and responses. Using this scan, you will be able to limit the amount of noise toward the web application. This type of scan is able to detect a number of vulnerabilities, since many can be detected using passive techniques.

Active scan: This type of scan submits a number of customized requests and analyzes the results in search of vulnerabilities. Active scanning can identify a broader range of vulnerabilities and is essential to conduct a full application test. Keep in mind that this scan will result in a lot more noise sent toward the application.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.