Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
vulnarebility

vulnarebility

Ratings: (0)|Views: 4 |Likes:
Published by api-26370766

More info:

Published by: api-26370766 on Dec 02, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

Detection
\u2022There are various tools for detecting the
system vulnerability. These tools are:
\ue000Microsoft Baseline Security
Analyzer (MBSA)

MBSA is a vulnerability assessment tool
from Microsoft to scan for security
inadequacy in Windows NT 4, Windows
2000,Windows XP, and Windows 2003.

Wireshark:
\u2022open source network protocol
analyzer for Unix and Windows.
\u2022It allows you to examine data from a live
network or from a stored file on disk.
\u2022Has powerful features, including a rich

display filter language and the ability to view the reconstructed stream of a TCP session.

Snort:
\u2022This network intrusion detection
and prevention system excels at
traffic analysis and packet logging on
IP networks.

\u2022Through protocol analysis, content
searching, and various pre-
processors, Snort detects

thousands of worms, vulnerability
exploit attempts, port scans, and
other suspicious behavior.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->