Please see more about the scanning methodology here:
Articles in this section
- How to see Vulnerability Snapshot?
- How can I change reporting language
- - Scanning password-protected targets
- Can I customize reporting in the Penetrator?
- What is the difference between the consultant and technical report?
- I cant click any icons on the desktop
- Do we have to turn off IDS in the firewalls when Scanning?
- Do backups include all the scans on the Penetrator?
- Do the Penetrator check for SSL vulnerabilities?
- Hi, I would like to perform a scan which detects if NTP is (udp/123) is exposoed