2.0 Vulnerability Management Flashcards
Map scans
Device fingerprinting
Scheduling
Operations
Performance
Sensitivity levels
Segmentation
Regulatory requirements
Internal vs. external scanning
Agent vs. agentless
Credentialed vs. non-credentialed
Passive vs. active
Static vs. dymanic
Reverse engineering
Fuzzing
Operational technology (OT)
Industrial control systems (ICS)
Supervisory control and data acquisition (SCADA)
Security baseline scanning
Payment Card Industry Data Security Standard (PCI DSS)
Center for Internet Security (CIS) benchmarks
Open Web Application Security Project (OWASP)
International Organization for Standardization (ISO) 27000 series
Angry IP Scanner
Maltego
Burp Suite
Zed Attack Proxy (ZAP)
Arachni
Nikto
Nessus
OpenVAS
Immunity debugger
GNU debugger (GDB)
Nmap
Metasploit framework (MSF)
Recon-ng
Scout Suite
Prowler
Pacu
Common Vulnerability Scoring System (CVSS) Interpretation
Attack vectors
Attack complexity
Privileges required
User interaction