Securing Network Infrastructure
上QQ阅读APP看书,第一时间看更新

Flow of procedures

The activity of a Network Vulnerability Scan can be divided into three phases:

  • Discovery
  • Port scanning
  • Vulnerability scanning