09.12.2012 Views

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

208 Chapter 7<br />

To edit our new scan policy, click the ninth icon—the magic wand but<strong>to</strong>n—under<br />

the menu options. Doing so will open the Policy Edi<strong>to</strong>r screen (shown in Figure 7.6),<br />

from which you can cus<strong>to</strong>mize configurable settings, found in the folder tree <strong>to</strong> the left<br />

of the screen, that are enabled for this policy. These configurations are as follows:<br />

Common Settings. Global settings that may be applied <strong>to</strong> groups of vulnerability<br />

checks.<br />

FlexChecks. User-defined vulnerability scan conditions.<br />

Vulnerabilities. Contains the vulnerability checks for this scan.<br />

Services. Lists the types of services that are accessed during the scan, including<br />

remote procedure call (RPC), TCP, User Datagram Pro<strong>to</strong>col (UDP), and<br />

Windows NT.<br />

Accounts. Lists the types of accounts that the scanner will check for while it<br />

scans a target. These accounts include Finger, NetBIOS, and RPC.<br />

To edit any of these settings, simply click a subfolder from the main folder tree and<br />

configure the appropriate properties from the settings in the right window, as shown<br />

in Figure 7.7.<br />

Figure 7.6 Editing our scan policy configurable settings.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!