上QQ阅读APP看书,第一时间看更新
Scanning
In this subphase of reconaissance, an attacker will critically examine weak points identified in the reconnaissance phase. It involves the use of various scanning tools to find loopholes that can be exploited to stage an attack. Attackers take a considerable amount of time in this stage as they know that it determines a significant percentage of their success.
From the numerous available scanning tools, the ones presented in the sections that follow are the most commonly used ones.