![Kali Linux 2018:Assuring Security by Penetration Testing](https://wfqqreader-1252317822.image.myqcloud.com/cover/290/36699290/b_36699290.jpg)
上QQ阅读APP看书,第一时间看更新
Scanning
When there is a doubt that mitigating controls, such as firewalls, intrusion-detection systems, and file-integrity monitoring, a full penetration test is ideal. Scanning will locate individual vulnerabilities; however, penetration testing will attempt to verify that these vulnerabilities are exploitable within the target environment. Let's have a look into each of the types.