Vulnerability is the weakness in the security system . A particular system may be vulnerable to unauthorized data manipulation, Because the system does not verify a user identity before allowing data access.
Example
VULNERABILITY SCANNING A vulnerability scanner enables organization to moniter their network systems, and applications for security vulnerability.
Types Missing data encryption OS command injection SQL injection Buffer overflow Missing authentication for critical function Missing authorization
Tools Open VAS Nmap Niktoz Acunetix
Network Scanning Network Scanning refers to the process of obtaining additional information and performing a more detailed reconnaissance based on the collected information in the footprinting phase.