What is vulnerability

 Ethical Hacking phases


1.  What are vulnerabilities and their types?

    They categorise three basic categories of security vulnerabilities in that list depending on their more extrinsic flaws: Defenses that are porous. Resource management that is dangerous. Interaction between components is insecure.

2.  What are the examples of vulnerability?

   Vulnerability Examples:
  • Taking risks that could result in rejection.
  • You're talking about your mistakes.
  • You're disclosing personal information that you generally keep to yourself.
  • Shame, grief, or fear are all terrible feelings to experience.
  • Getting back in touch with someone with whom you've had a falling out.

3.  How are vulnerabilities identified?

  • Identification of Vulnerability (testing)
  • Security analysts scan applications, servers, and other systems with automated tools or manually test and evaluate them to determine their security health.

         #BBD0E0 »

4.  What are the 4 main types of vulnerability discuss?


  Physical vulnerability, economic vulnerability, social vulnerability, and environmental vulnerability can all be defined as a result of different forms of losses.

5.  What is the most common vulnerability?

  • Encryption of data is missing.
  • Injection of OS commands.
  • Injection of SQL data.
  • Overflowing buffer.
  • Authentication for a critical function is missing.
  • There is a lack of authorisation.
  • Uploading of harmful file types is unrestricted.
  • In a security decision, relying on untrusted inputs.
Previous Post Next Post