Chapter 6

Vulnerability Types

Introduction

When you run Nessus against your network, you might receive much more data than you bargained for. When staring at a massive report, how do you begin to know where to start fixing things, or where your real problems are? Being able to understand and classify reams of vulnerability data is one of the areas in which it’s truly important to be able to identify and understand the different types of vulnerabilities that have been found. Having a clear idea of what vulnerabilities are out there and in what order they need to be addressed ...

Get Nessus Network Auditing, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.