This document discusses vulnerability scanning tools that can scan websites locally or remotely to detect known issues. It provides an overview of example scanner user interfaces and categories of test vectors used to detect vulnerabilities. Specific vulnerabilities that can be detected include information leaks, session issues, cross-site scripting, SQL injection, and cross-site request forgery in popular content management systems like Drupal, phpBB2 and WordPress.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
21 views
Module6 5
This document discusses vulnerability scanning tools that can scan websites locally or remotely to detect known issues. It provides an overview of example scanner user interfaces and categories of test vectors used to detect vulnerabilities. Specific vulnerabilities that can be detected include information leaks, session issues, cross-site scripting, SQL injection, and cross-site request forgery in popular content management systems like Drupal, phpBB2 and WordPress.
Download Complete Kali Linux 2 Assuring Security by Penetration Testing Third Edition Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali PDF for All Chapters
Download Complete Kali Linux 2 Assuring Security by Penetration Testing Third Edition Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali PDF for All Chapters