From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Solution: The Temporal metric group
From the course: Ethical Hacking: Vulnerability Analysis
Solution: The Temporal metric group
(bright music) - Okay, now let's check our work. Now, the first metric is exploit code maturity. Now, this represents a value as to how likely the vulnerability will be attacked, and this is based on a couple of things, the current state of techniques, availability of the code, or the level of awareness of the exploit. And sometimes there's a couple other things we want to consider. For example, the exploit might be possible, but it really isn't worth exploiting, or the exploit might be possible and it is worth exploiting. The next metric is the remediation level. Now this is an important factor for prioritization. Now the typical vulnerability is unpatched when initially published. Now this is a good point because we don't have any protection. The vendor might have some workarounds or hot fixes that might offer some interim remediation, but each improvement will adjust that score as to the urgency decreases or as remediation becomes final. So ultimately our goal is that there is full…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Common Vulnerability Scoring System5m 10s
-
(Locked)
Common vulnerabilities and exposures3m 36s
-
(Locked)
Outsourcing vulnerability analysis2m 41s
-
(Locked)
Bug bounty white hat hacking3m 19s
-
(Locked)
Challenge: The Temporal metric group1m 36s
-
(Locked)
Solution: The Temporal metric group3m
-
(Locked)
-
-
-