Vulnerability Scanning - CompTIA Security+ SY0-701 - 4.3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:01 AM on 4/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

5 Terms

1
New cards

Vulnerability scanning

• Usually minimally invasive

- Unlike a penetration test

• Port scan

- Poke around and see what's open

• Identify systems

- And security devices

• Test from the outside and inside

- Don't dismiss insider threats

• Gather as much information as possible

- We'll separate wheat from chaff later

<p>• Usually minimally invasive</p><p>- Unlike a penetration test</p><p>• Port scan</p><p>- Poke around and see what's open</p><p>• Identify systems</p><p>- And security devices</p><p>• Test from the outside and inside</p><p>- Don't dismiss insider threats</p><p>• Gather as much information as possible</p><p>- We'll separate wheat from chaff later</p>
2
New cards

Static code analyzers

• Static Application Security Testing (SAST)

- Help to identify security flaws

• Many security vulnerabilities found easily

- Buffer overflows, database injections, etc.

• Not everything can be identified through analysis

- Authentication security, insecure cryptography, etc.

- Don't rely on automation for everything

• Still have to verify each finding

- False positives are an issue

3
New cards

Dynamic Analysis (Fuzzing)

Send random input to an application

• Fault-injecting, robustness testing, syntax testing, negative testing

4
New cards

Fuzzing engines and frameworks

• Many different fuzzing options

• Platform specific, language specific, etc.

• Very time and processor resource heavy

• Many, many different iterations to try

• Many fuzzing engines use high-probability tests

• Carnegie Mellon Computer

• Emergency Response Team (CERT)

• CERT Basic Fuzzing Framework (BFF)

5
New cards

Package Monitoring

Some applications are distributed in a package

- Especially open source

- Supply chain integrity

Confirm the package is legit

- Trusted source

- No added malware

- No embedded vulnerabilities

Confirm a safe package before deployment

- Verify the contents

Explore top notes

note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)
note
historical globalization figures
Updated 1082d ago
0.0(0)
note
~The Phagocytic System~
Updated 536d ago
0.0(0)
note
4.8-4.10 Presentation
Updated 113d ago
0.0(0)
note
States of matter
Updated 1246d ago
0.0(0)
note
Chapter 6: Learning
Updated 1090d ago
0.0(0)
note
GEC1-LESSON 3
Updated 569d ago
0.0(0)

Explore top flashcards

flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)
flashcards
Wat een taal zeg
91
Updated 1221d ago
0.0(0)
flashcards
Sp4 Un1A (23-24) | El arte
30
Updated 952d ago
0.0(0)
flashcards
Linear Algebra Final Review
47
Updated 471d ago
0.0(0)
flashcards
Odyssey Terms
35
Updated 1240d ago
0.0(0)
flashcards
is 117 final quiz review
44
Updated 1204d ago
0.0(0)
flashcards
Passe Compose
54
Updated 1147d ago
0.0(0)