![]() |
Once the data has been analyzed and a list of potential vulnerabilities has been formed, the vulnerability confirmation phase begins. Just because something looks like a vulnerability, it is not necessarily a guarantee. The Cisco Secure Scanner will again probe the network to verify that the vulnerability actually exists, but this time it is probing specific things on specific systems. The scanner may issue commands to the systems, analyzing their responses. This is an intrusive phase, and may generate log file entries. The scanner was not designed to perform any destructive or DoS probes. |