From the course: Ethical Hacking: Vulnerability Analysis
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Solution: The Temporal metric group (new)
From the course: Ethical Hacking: Vulnerability Analysis
Solution: The Temporal metric group (new)
(bright upbeat music) - [Instructor] Okay, now let's check our work. Now, the first metric is Exploit Code Maturity. Now, this represents a value as to how likely the vulnerability will be attacked. And this is based on a couple of things, the current state of techniques, availability of the code, or the level of awareness of the exploit. And sometimes there's a couple other things we want to consider. For example, the exploit might be possible but it really isn't worth exploiting, or the exploit might be possible and it is worth exploiting. The next metric is the remediation level. Now, this is an important factor for prioritization. Now, the typical vulnerability is unpatched when initially published. Now, this is a good point because we don't have any protection. The vendor might have some workarounds or hotfixes that might offer some interim remediation. But each improvement will adjust that score as to the urgency…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Common Vulnerability Scoring System5m 10s
-
(Locked)
Common vulnerabilities and exposures3m 36s
-
(Locked)
Outsourcing vulnerability analysis2m 41s
-
(Locked)
Bug bounty white hat hacking3m 19s
-
(Locked)
Challenge: The Temporal metric group (new)1m 36s
-
(Locked)
Solution: The Temporal metric group (new)3m
-
-
-
-