• Scanning for vulnerabilities in a network.

    IvanildoGalvão
    IvanildoGalvão
    Greetings everyone. I need to carry out vulnerability identification and mapping work on all assets on a network. The tool needs to be free, initially, as it is an x-ray of the network, to deliver a report to the client. The best recommendation I…
    • Answered
    • 8 months ago
    • Community Chat
    • Discussions
  • AVGator

    Keith Russell
    Keith Russell
    I was reading about a new vulnerability in AV programs, AVGator. In short, the attack works like this: A malicious file is delivered to the host, the AV catches the malicious file and quarantines the file, the attacker manipulates NTFS to restore the…
    • over 6 years ago
    • Community Chat
    • Discussions
  • View related content from anywhere
  • More
  • Cancel