Download now Free registration required
The objective of NeXpose is to provide a maximally invasive penetration of a set of computer systems using known and unknown vulnerabilities to access data and demonstrate how control of the system can be achieved. It is up to the user whether to choose the most invasive methods, or choose vulnerability tests that do not disrupt systems and can be run during production. Performing against network systems, operating systems, web applications and databases and correlating the results using the built?]in expert system NeXpose provides proof of attack vectors. It is a design criterion that NeXpose operate in the same manner as a cyber criminal, using information discovered in one domain to attack another.
- Format: PDF
- Size: 246.8 KB